_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1185.382041] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1185.402982] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1185.444484] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1185.495453] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1185.507759] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1185.766302] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:30 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:30 executing program 5: gettid() accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080), 0x4) nanosleep(&(0x7f0000000100)={0x0, 0x989680}, 0x0) 03:41:30 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x7}) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000080)={0x4d, 0x1, 0x8}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:30 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x9, 0x2e, 0xa90}, 0xc) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f00000001c0)='./file0\x00', 0x28) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r0, &(0x7f0000000180), 0x0, 0x40, &(0x7f0000000200)=@sco={0x1f, {0x4, 0x200, 0x9, 0x2c9c, 0x76, 0x8}}, 0x80) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) getsockname$unix(r1, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xfffffffffffffee7) pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) write$binfmt_aout(r1, &(0x7f0000000480)={{0x107, 0xfffffffffffffffb, 0xff, 0x18c, 0x108, 0x4, 0x1d4, 0x5a1e}, "8890de4cff598576574ab82a055fedd07c7922d0fbc46ac42f938227eb16d7756ccb2ba583388e75f0835d71157cbc702f15355eb6c87735982862d2ffd605dcfd52dd2ff82ba215291eec02374fadbe05cbf553d16277628303a78fee17e54056ddeb20530da1f407e950b9125269adaa7ed6a3d4d4932ed0b2d31204e0e8fac710af337824d44ec2337d7f7bd731fa356ae4447c938b776bf97f29b53f040b272b91f37609db006fb64ebea9557c1649aa9807aa84f12422ebe073c89f4478d724b93ec5cb408bc6538a98ac114219a80781f92d5f522fdd627e85aa38b5edddc2f195923c62077c00b106686b4abf23", [[], [], [], [], [], [], [], [], [], []]}, 0xccc) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1187.983988] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.020831] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:30 executing program 3: pipe(0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RVERSION(r0, &(0x7f0000000280)={0x15, 0x65, 0xffff, 0x8, 0x8, '9P2000.L'}, 0x15) r1 = open(&(0x7f0000000100)='./file0/../file0\x00', 0x4000, 0x101) write$ppp(r1, &(0x7f0000000140)="c47bc79ebe1c5789fb508890c0b591796cd377ca6c5dabe6130c48c2ebc7cca7274c113619496578e691ec16fbf10e4f1f6cceb66abf2686daf8812eda34c7a0a197e2f0cf2e5287130a0db787c73d943a0e8ef8432dba4e1c4c93e16f17a0b2f63008eac936b9dcce0249c3ed0ee07827bca2774bcc52980c542cdf7a9bbe8e5fc2e5dbbd901e32caeb2c7cf684f8526e6420a41cfa65c913edea94410969d4c5066d66476ca85e26e2bd0b9b446168eede29bf108b3e6b84d3a27a2193d46786bf", 0xc2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000080)={0x1, 0x0, 0x1, 0x80, 0x800}) clone(0x9004000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) set_tid_address(&(0x7f00000000c0)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:30 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) r0 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getenv(0x4201, r0, 0xffffffff, &(0x7f0000000180)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x200040, &(0x7f0000000540)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030313133332c6d6f64653d30303030303030303030303030303030303030303032322c6d6f64653d30313737373737373737373737373737373737373737372c6d6f64653d30303030303030303030303030303030303030303031312c7673636f6e746578743d73797374656d5f752c686173682c66736d616769633d3078303030303030303030303030303030372c686173682c6673757569643d39633777306666342d350033642d357337302d7f3435642d63643365773932382c657569643d", @ANYRESDEC=r1, @ANYBLOB=',\x00']) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1188.042952] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.049503] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:30 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r0) write$selinux_load(r2, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "04c6b3b098d33a7adb3b2fe690d55950915e90114d329386ec492137c8b23bf94ff870aa6b340f3e8324f2ae4872413e053953f308e4142da4167a0760d94f957e0c39"}, 0x53) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1188.074871] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:30 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stack\x00') write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14, 0x13, 0x1, {0x24, 0x3, 0x3}}, 0x14) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') perf_event_open(&(0x7f0000c86f88)={0x2, 0x1f3, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140), 0x0) ptrace$setopts(0x4200, r1, 0x40000000, 0x48) tkill(r1, 0x22) gettid() nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1188.182708] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.196150] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:30 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x80001000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f0000000340)) close(r1) mknod(&(0x7f0000000100)='./file0\x00', 0x20, 0x8) write$binfmt_script(r1, &(0x7f0000000480)={'#! ', './file0', [{0x20, '/selinux/avc/cache_stats\x00'}, {0x20, '/dev/loop#\x00'}, {0x20, 'cgroup2\x00'}, {0x20, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe'}, {0x20, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe'}], 0xa, "20fdc1df73f8d6eb0754609c6ea099e028b4aea70c"}, 0x291) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xfffffffffffffff8, 0x600c02) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1188.218783] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.241186] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:30 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') read(r0, &(0x7f0000000200)=""/250, 0xfa) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) set_thread_area(&(0x7f0000000100)={0x20, 0x20001000, 0x400, 0x7, 0x10000, 0x7, 0x1f, 0x3f, 0xffffffff, 0x7ff}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) socket$packet(0x11, 0x3, 0x300) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1188.266810] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.331949] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.387319] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.390222] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.409368] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.437196] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.440801] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1188.502926] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:33 executing program 0: pipe(0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000100)='bdevTeth1\x00', 0xa, 0x2) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:33 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:33 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) clock_gettime(0x0, &(0x7f0000000080)) nanosleep(&(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) 03:41:33 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:33 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) fsetxattr$security_selinux(r1, &(0x7f00000005c0)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:system_map_t:s0\x00', 0x22, 0x3) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1191.104201] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.104518] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:33 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0x80000001}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000600)="8c02a9c5736460b46715c8002e6852a7882d878d283d3af679ada83d698df80aa3df218b3657835e906999e67f82240dc5212663d4a5be5518b64ec32bfd310c", 0x40}, {&(0x7f0000000640)="196f9176996e51", 0x7}, {&(0x7f0000000680)="e7d5768f568f38247730f01ba499dc97054eb748b615d3a16fca4f906b7e39c58ba0df1023752f96646d47a3c114307565040927ef1ae5a1f334ca1a52ca41896600a1905f3a9e5d43903df213baf0b45023d7eab8", 0x55}, {&(0x7f0000000700)="7b09d71051a07463d0e36cbcb44332014139de49cec9ab77370a7e9ce1ddc1923e97780d5ab7284b5a9ded220c498f4e3777fbe79b2aed157bf58facf2b89d6583682fff11f1c1d868b1851e4381fee514bd5d0bee2813c67a57ca658b165a77d2037c5b1dc8a9bbe5b219d96418cac33543d4ad3d00cf558e04c148210eaf42d7e447a23d4f9df6a0557290bcf11ce44ef8f2c0028bfd3805fab2a18ea4b3e6b7d5499d10679a2e7cd331daeb4e22e2387d", 0xb2}, {&(0x7f00000007c0)="cc7e289181bc95d3ea64131c57d0abc9002c0b4d74177288fb6d5cfe0e8c23afc776f4c99900c17c64ebf2ecf15bfd16dde0227562eebc1554dc46b5365b0f5b2dcec2591e96d3b8f82fda79c3e48b61e118435780e2a66b1795a0a5d2ab49a50e10c3af95323bdf5fdbd9184dd6a8b81d648c6e122cb7113dbd219d2b194c859a2fcf4ffc73c07c923a868bd708ed661b63f2d0da", 0x95}, {&(0x7f0000000880)="7b13bea6ceffaae7160b35ee2877d3217983ed91fc92b6b5eb20bb9a01a0ada2d0f98e4e3108e9595a066a271b9d911692aa1597b24cb02ada26a54f52748c2a8db32a5614d3dbfb9a3be895ab411b5e06a9435334bfc5a71711", 0x5a}, {&(0x7f0000000900)="01ab373f0f4431b1d0a5bb3c51234bbd5f3483b0c28643ede4f87096fae77b3909e91c6113a14d13d17e53076ab9035717f6941332c5e05c9ff6bd9646f818d65e21e8df3991b14109124cda09dd5381f44cc42ec36ebc4fa4ac2d4883b597cfaded63f11da70b6ade89253d791d910fc899bb3fb9056bf46316c7ded39b648ea556b10ff5404760f197bde992c990773a1bd1f7deb05668456c16c72395cff18cd3fa1bf07d16c8c91ca756cfb416a8c437738b2d", 0xb5}, {&(0x7f00000009c0)="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", 0x1000}], 0x8, &(0x7f0000001a40)=[{0x88, 0x107, 0x5, "14a2ebece837e89dd17e2094881cd907c67997cdf99acf70c02d10c0b23a2abbd0a685b0646de67807cf2528a4b9f22b1372d95fec58b58bc13de42e4e2ccd5be72e8fba93b8bdcf876e8649f21b2be7bd32109031c1d106df69dddce67966292559b5f7c0e30a36cf7c9a179bcd6edc96b4ad4c71"}, {0x80, 0x10b, 0x8, "fdc1f05f638946ff87a20e475dd3166f5612abe09683d6b04abbc4e2081e9a9e0be3cc391dbfcb07c78c994fdd8d29eb5c078aca242f880d3f4b10f256a10021fc438f8260ffd156feb8bb81d5321b89ab6641f0aeb53b0cc75c70b75c679325b668e4eb92db807a7e02f3"}], 0x108}, 0x400c0d1) pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) readlinkat(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=""/206, 0xce) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000001bc0)={0x200, 0x7fff, 0x20}) write$binfmt_elf64(r0, &(0x7f0000002d40)={{0x7f, 0x45, 0x4c, 0x46, 0xfff, 0x80000001, 0x2, 0x9, 0x800, 0x2, 0x3e, 0x8, 0xe, 0x40, 0xe0, 0x7, 0x6, 0x38, 0x2, 0x991, 0x7, 0x101}, [{0x70000000, 0x1, 0x7, 0x8, 0x6, 0x8000, 0x3, 0x10001}], "f9969efbcc74eaf13a60ad36a11d47ce546b499cbb5fd897b34df722f6e116758a7b1e84db4145d4ae0876779c27e42a73df50853fb1ab9c61d1fb7d11b0d6f265ac15c5accbcc1503a87c87c3fc6aaf1af38e77c0c168f2feaceaa3d726afb4f974c7570f2d6bdb217da94f9d9290753f91873837de0079104ec7e2b8b5b94b2a6c29de9564d437606f32854fd68c6c4397bf252324b5da0dd6118e4afd3383af4935eec8b2cf6f73c4d8dbf457fd245a1959f587988ee6c9d1d82d71aea6525be7ebcd9609", [[], []]}, 0x33e) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x600, 0x20) pwrite64(r2, &(0x7f0000001d40)="0385661d3d8d2526db2bb9425f46de5058dee5de2b9fe81160dc2c2c8440920ec5c647c1d44292fc2054a746f656e1eb1ffb190dd50af106b49f8fc4103420357193ed04a52a211bc7426d7de445d1f671c93d5b8166c5e58e4e8dcef103184aed418be3ee0107e0039003cbe557e52522cf8208b0eb4ccf9c45b6f4c2227b398d0553a097646d3c25b346794cc295d4a4fd21384dab440f23e1b8deea158755fa5b077f4fa43303ba3f573d98a8d6a9f266fa7a180265c5cc379eab4e04fc809527f0c31492037b37190971cc7093f98f8fb0026191f50776f292a70aff0ee5861328727d7940a80f98ce964517889fc19bea63c1cc5161895c0c48c586b9f406fa117b12a8dd08fbc381283bae37412320c5684c1b26c421b689ff7ed55a803b44c71dc7c8716631f56549068c070ba593bfe1914502bf0ce107e270b1268770d05f87f44d12c02bdc4449b73b47920fd17f46ba31eb5e00f6919a4a402dff852b5df61850ed336bd841a8f9d8c14b5a7d724cb5f4e170bde0777d320f7d3fdb1a8f6512e7bbc96ab4e183629eb82fe6d977a274e5a28d2245e8b1770eb2f4372d4320bff0b98c6cf7f72735fcc068ec7e31b8ca0a68150bd9daf5487c750fc7b1320242a49cb5a35a618907568fc7a4c5b0fe025fa2f5d1d8192a6d100016598f600600194d77dca80e1c527140ff943b4f3439d9eaf704772bf34cadfc73329c1b65e2c4c0cef16b3a3ff576eb27e90bb0bf4c712a27bc5be3e6328b3500067774151072f24b36400657a9311062e533b230889c00e99ff1cf064e1c7224f590399163c7c38ffcce7d7a99bdca69779fb258a33937964fd05f78c896ad4b1876eebdd4df57c689b939f0e0289085de6b0a889600614e109805c6e98ce78611a13f478f47f102c565266dd313fa9c3af527657003ed6f68fa78f1b883d42ac3d4dd1ccc95006ad08fc3cdf7480424be7589c48784d548dbf9c5e82b4d47adaa776220b9d1ea6ca60fa4bf4d2ea297df4abae3ed8e7438fa594e24ab838f1cccf8664763709cc8a9175266ec03e5a5147bc7adb1452971589586f832dac73b5a9cbb9fd96cdda4375cb4c49b2356efda2c173467478a8d068f178844f1f7814fdacfc5524fec6141c5ccaf57c684c58fb67ad6a70579693ec9e81156b81797760ea530aac84410826e87141dd7bc33bfdff4fb5db5294dec0917420153b1d064891ac5018041325ad0f89a2600d8d16bddde3ad9faa4797c13b9b8c53ba9cbcaa688d2510767934475e10b52f0988d19d183d08d9207fde3cc47971ffa9b6b6d9a7c1cb382c4184cac432f2c0016e3fc431a984eb8f4016161290e0d25488a501b6ca21575b841201ca2bfc1ec98a22b1cc418159a42a74c1e8dd7cfca6e7db16fb0cccba857dfecdbddb1c264b375f5449bda2d05fdbe0d92c9c9759ff81dd3579c879d6bd295684fbdbcf5f242b3ba8c5485a94182e97d1152fc4111321ea10d2e59d904fd2de767191fded3b99c47ffd8d224f445be3a5aef3ac057dcde54efbd7bf0f47d56114ce53a8296b7abd2c643de0a94c04887ae61d3c11a4beed0db45d6bf1e831bb926480cb9ed7a9adc154966372ba8fe8e3db72a265c00de49e0f3efadcc46dbba836a62e9d69e8ffe7dd6106e52f10784137b2f27c4158d1d5362e698512203cb6047e054ea64130a1ff22055ea1913e9ab240cc6da4b2e59ea00ee77a67e7dbb9a510a369eaa27f55aa402a377c4c9d925e28b4ca972aa446b64535f069d080d738b61ebca67a872d9d420d0b818c0d965cd9535968f764ad36168702e70cd4ed05fc0127ac3b6925c1c230c73b4ad8f2e38e8093ca0ed2a1cac0e5794ae28f822d19f2be3a811685bf11ce84d3cf886368bc4a26eef8695ad473b42c0bcefd58cc1dc3da5fdf1591c9d6ec01966d5eb984517154ad112478e651c4ae739f8a43b72fdf61809261be810ad1e49ab89abd0af8cfeb16fc974acda9bb5248de9c35bed0ef0aa219095c3b79bf5263584a4a294c01b006d159da4ad81d9b26274750c289907e3f8d56d124ec09bc29e0f0ce3a3483305bbc89d25e5f3a1971d73e4e1464b0c9fabb60c3824dae91c1ffb9174521746e06975cd7e2cf60a0b0b083eba30347ce5368c7bc73bf2e6660380d4540aab5b8636d543eff588a395d1646d1d95f9954b7a8bb9646baf20642fd12e78de6de65a0413d2ffff3299c5b4d4c931eefad4a2dfcc0aee34c2a99a3bfb4685f9a16a99605a811828bcc53f2c29d463e74e2955e4e4ca308874413f7eca819e56367b35c3d048f5a33bda93afce25a8543b0a58fd8c9e9c130e5eccd0b60af738b40e2937ab334941e9b11b7692f1c4ef8e60b74db6c84d7efe90fbe2c744b395ad65cd89757f523ea890727d47d08add1657d3ac40dbe082b7159afbea22d7dfeab452d2c9b1b3e80dde1fdd573555ef5c36aea098dde68b1c1f4995acb09b0c6ca70d7df4970028d1a62ff8da7efbd63ceee46f68f2a48f9b49fb128f1cbaea58f9917354dfdeaed343086acfe11b355e96c09940f5360f4a73bca8ba1092295bd3e07ad375b953e3559fe2ea6b8082150b9081fa6e7701a2a95d8e8dfaacbd3aa3474d23376e4294c946a2486ed2e6e56bd242d3335539f875dd00068ea1f91ce4b9cb2eb82b98f9a2b10dcd9be15f69b13eec552c6519b0af8e403efc5d905e77aa4528a84baa6aa20cf5c9d9db966397b73ba00625662a37ee13fdc87d8891fc4f3de2641089c1bf4deab754068fd35363bee2921dc1ffc1f64868e016a1f26029e5f4ce40fccd9f4e92a02595d5d602be78edb1c160065789a98828e5e2ed0ea5771544b8824140ac3358079da9fd17c99d13b84e9b1df8dbb39c7c12bcf23d5cf90d0c9f25694eac70889c4454f13bf167e1662d9e4996e21777b38564696451883666da29b0e1912f8d9c57de36fb7f97860c9a933c00759a745ebe98c8f674054e789b6d0badb465cd482be03a20dad4c8ea726028fbccc7769d787e426ba1a785c329dddc8e47416d23249a8f685f45859223dbb95ed2833b457a4e45c3b552bf552c97b27563630a70ea58650157774f17dd0e5305de073c4fd27d01fcf811bcb92ee22b696317e861b0cbb2e7e0340813ed84cb013e176b56ab3d0b09163307d835599b9271c46d113451ab4b5eb58490e24f5b9a6f059d975d49e3003a69ac37f3aa1122ce1b9b4c177342a55b5c4063c2b6123c2374770c9d4b0fcba03e1d65f6f62b9076238426592913c5e99cd4ee8e573a03499692607b2f09430dbb18944f3b7c6973394dcda2e29a1705e9661df1f649fa773de029a9c4854378742e86346c3a6bf84f197035fa86ad65ddf7f20836b607c04482883283dacc932eb3a69846a431669ca992d3d7140205e29cbbd3745199360251004c806e6fe233bb3fe507305841bceebcc79059d645b0c03656ce410f04f15eb72e25fbac4e7aaebe5a72d799a727760e36b7e9d33ecc4512f22757086a69a6895acdb06bb30eec33ace6277d0e0bb34cb514ee4af66c606df1e6082ad3b0c1cba293c95690865ed03b4df2678f39de792ec1e09b3cda6fd19d1de1ff36cbe418d5a96f92e23ec050ec83765f27dac97d9c719e728983d03a26f6b821d8df039bc84c8a3cabde6b15eb5cf68996eabb28355232c7bbfb6cd9f456930513fc6132af90f0408f1a2d1ea03337f62dd0457dd3a6db4fe08c2c7d225265161f95cb2c2c2737e2a672e997187184627749e0c6dd23bfcb337495e144e2dc8648dd4f2ef63c3b668b3c4877e58456e2c9c49ea9de827bed07693f55d32207a6f2b51aad549086cedb94295ba4627cf575d2398a976945d5801764211f826ea4601dc5ef8d78238b7bc48f6ef0cfb59f4ad78dca24e9350fb138a0100e6544f9004a502d9bfad8a49cb5c18c05a45c6b8ede21ac23079420cee09e3bde8e52d16fcb88b1f62fbdd9adf8939eb3c88745171e2c95e4889150c6ea52aed5b884b477933175baa77bb5a6915b0693c28829e646f038ec7497e9f1306f4e6546f6668e3382197119536c316832608406796121ae4979a6f2354b9cd07ef0d5b2705a6ba5dce3c8e3717c8dfdf123744de3db39a3bb255640ed217f7b6178ef5274cef80aa95cf5e667cd874c09e51dc14c50c096aaf2109154414ff2593a6e2e7ecd1fa9ed486d64c6f46236ef74c20d8dfff50c2550a7da3debabd38731925a6a3c3af75a6c0e7135d90434bdfd68c3b4d54109af98c6a17b286d187f63e34168eca19bd7d94a925918426c7886173fbd85b5ef0618bdf5d01d545ceb185a46b4605ded954fd21fb3e39a7c9ef8aeb627f9f9e5dabe69df03fca5f20b86c60bd0f1afbda8876295f4445eb31efe94fd3593bf2adfe68aa9f1712106fe4ded9bed5cdaa71193cbb6cb27704f00aa9b58ad869f6cacb0da52b48f46a139cf7d6506af2d06c71f221584178a5d216b744b129735342278556756fbff5e3818192c6fbcbb3c3f8471e17d98ffeb914cd4e5dc0bb9b432dfaf27ad23c8f325fe3bb0c65f4d22c85a8200d1e45c7d11f96ea525ac9d6526c0ee48b3a6808eb312c72823ad94c1385278dfbde35e956b9fa217bde1861abe3790cd3d694e9a1502df454afcb29138a6d502070764b68f65e7392332b14044b65cc580618182c14ba81ee5b03bd09c5aa843c3acb17eb78f7ad73c2a3297772db817f433faff9dbd7b1d5a8817bed467378c6a7ec03561fb557cab1bc93c88cc7198a5a57dffc32d63d9f635dd10587be1624d8d26e39304f249077c3afb54349a60d699080e8bdf38ee291d52281ea3e0982b6287da3fed9704ab1dcd5a9baca8b3654a02dc0bf623f9008a2a66aadd20d01dfc8d5a65cbdaa2565502ab742bf808ca6fc96e39f692cb4c6a3f3bcea3f80294de8bfb53aa04b412e80e979b6f4cb74c6eb4da6de6acde0090517a48efa360c441a471b2285faa035d5050e68f9365003d5fbf0d5af217e5b6ec2f76b41df79bc5b5577f33c32b950a935d834837294357f9bef1fd94660643db9e88b21a22b9e29771f68458361edbbc61214435e52f6f8038af49eae41376228d03859feef1f968b8fc06812ff29b92c7569b09b3b5d8964098443dbe684cb6a016d25fcab0e811f585da6c215fac25e3281570b280a2ea12fbee4aa6a96469d04b26534e437115a6063a9560e723032de78782e395d055936006f968f65adb75e1fe419cf8c4fe21daa0f4588cbfb50a4d348612413f038ca85267c8fe30fd143e40e1c4303abfc918d54f4051ecd7ececa9f6ad91da80c5cad1100a643feed5b7be84d1cfd6cbd545e232bf7636c473f39d57fa5bc49fdc8acb54cf67bf9990d5577010fe0029f00be240ce239f6b1e0f26dccb1b64b8db55bbe48a8be32c5cb80549090d9fd40ab85fa3b912a4a8025f77facec93a714b83bdac7ce3b29df5b39923f3c98d05ecd85260a8c69991e0c49353dd573f937ebadc4bcb2ca52cca6d2b9d11ba198f26a57f7d61f0198dfb577398e02b326ad3402ef952d19a7dc13ed059345f3120a1a276c587d0dcfbe0fd043e48823d71b3648157f0e8ffe1d8941f13ed625506b68eb582a483bf9763425396e64275c3c14e3e79ea8e6acf0d862e96d3a0682296909a9b6f44382b5148d9a1b85d38494ba951c3795da414f58fcd41210f19b5bfb362d6bb28329a89815f71ea1cd2b3d7cc68db3249a19c6f51136d74f6e81e05a7646dab24696a0ebbce603a80c76e62e79eae8d3962db39c2072870aaa75f0c85", 0x1000, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000001c0)) init_module(&(0x7f0000001cc0)='cgroup2\x00', 0x8, &(0x7f0000001d00)='cgroup2\x00') lsetxattr$security_smack_entry(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='security.SMACK64\x00', &(0x7f0000001c80)='/selinux/avc/cache_threshold\x00', 0x1d, 0x2) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000003080)={'nr0\x00', {0x2, 0x4e22, @remote}}) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=@ipmr_delroute={0x94, 0x19, 0x0, 0x70bd2a, 0x7, {0x80, 0x80, 0x80, 0xffffffffffffffe0, 0xfc, 0x0, 0xc8, 0x385d50ceddc314dc, 0x100}, [@RTA_METRICS={0x78, 0x8, "94bd6f4f4cc44fce23aa98a7170b9cca6e4e9be1f6db2139755bdf600bec82d3784077a604a1d5d35a85f1f63c9f91f17e7f3904bb5f8969ad885a21414b967be7041a7316c0c64e023502eface7d459a9fcf8a7d38748e33c45e234d75f056cfd3d3dc06c36eb783d2e924ad47c08db7d9c"}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x4008800) [ 1191.164490] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:33 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, 0x0, 0xffffffffffffffb8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$packet_buf(r3, 0x107, 0x5, &(0x7f0000000140)=""/50, &(0x7f0000000180)=0x32) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) [ 1191.253876] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:33 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000200)={'yam0\x00', {0x2, 0x4e22, @local}}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@newtaction={0xa0, 0x30, 0x8, 0x70bd2a, 0x25dfdbff, {}, [{0x8c, 0x1, @m_simple={0x88, 0x1f, {{0xc, 0x1, 'simple\x00'}, {0x34, 0x2, [@TCA_DEF_PARMS={0x18, 0x2, {0x80, 0x5, 0x7, 0x7ff, 0x8825}}, @TCA_DEF_PARMS={0x18, 0x2, {0xfffffffffffffbff, 0x2, 0x2, 0x9, 0x2c6}}]}, {0x40, 0x6, "cb48504e8bac67eacf1eaa3edf72db42ccf1ab4fd2c10b32193aabc618d6900461f37e72a40772c683f056efc9be8a3ad8fcb03ca48d06dd9424da"}}}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x10}, 0x10) pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1191.337728] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:34 executing program 2: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x80800) write(r0, 0x0, 0x179870c226524b1) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000180)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x4, 0x3) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:34 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100)="05c7c94f4fa361f5510478f7f6aa1aa4c4ceef168783ef1ab06149d0f81bcde5accd5538fc26e9cb0da5463f2b4456ce4dca71c2d69b47672be63e74ee1ee2de46730704b574a882363660dee752a66e2ce58141a70c59345f5dab683571c450c81cee873cae3498ef68eeef44f6d034b5426ad8ad28e6f49fc379156cce1972763b13e2238c239727fa0aede27ec8aa414c047d4957105f388654b8462bf6451848bef5e91691290311e8e1e774e058932ccc493e11970d98fc71479a4d93dfa010ca7601a6e0150094b0b2fb4093298cd6d1f52a888321cffe9194af4e350205b5d0730cd84de32cf7f1af15b30785a37f264110050108f6", 0xf9, 0x800, &(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1191.406866] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:34 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) r0 = getpgrp(0x0) sched_setparam(r0, &(0x7f0000000080)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = accept4$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0x10, 0x800) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) tkill(r2, 0x22) socket$inet_tcp(0x2, 0x1, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1191.521118] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.522568] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.553026] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.629357] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.629829] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.662807] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.687846] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.704545] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1191.716186] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:36 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:36 executing program 3: pipe(0x0) umount2(&(0x7f0000000080)='./file0/file0\x00', 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x10200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:36 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000004, 0x3, 0x8000) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x407, r0) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000040)) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:36 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='cgroXp2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x22) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:36 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() sched_getparam(r2, &(0x7f0000000080)) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r4 = dup2(r0, r1) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f0000000480)={0x10000000}) ptrace$setopts(0x4206, r3, 0x0, 0x100000) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000001c0)=""/233, &(0x7f0000000040)=0xe9) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000100)={0x926, {{0x2, 0x4e20, @rand_addr=0x81}}}, 0x88) tkill(r3, 0x3e) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:36 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x3, 0x34a, [0x20000480, 0x0, 0x0, 0x200004b0, 0x200006cc], 0x0, &(0x7f0000000040), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x5, 0x0, 0x890d, 'syzkaller0\x00', 'vxcan1\x00', 'eql\x00', 'vlan0\x00', @remote, [0xff], @dev={[], 0xa}, [0xff, 0x0, 0x0, 0x0, 0xff], 0x6e, 0x9e, 0xd6, [], [@common=@STANDARD={'\x00', 0x8}], @arpreply={'arpreply\x00', 0x10, {{@link_local, 0xfffffffffffffffd}}}}, {0x5, 0x10, 0xf4b37bb053483e71, 'bcsf0\x00', 'veth1_to_bond\x00', 'gretap0\x00', 'hwsim0\x00', @random="b15dc964f23c", [0xff, 0x0, 0x710d17fc98f89432, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0x0, 0x0, 0xff], 0xde, 0xde, 0x116, [@rateest={'rateest\x00', 0x48, {{'veth0_to_team\x00', 'bond0\x00', 0x20, 0x0, 0x7fff, 0xfffffffffffff0f1, 0x10000, 0xffffffffffffffff, 0x9bdb, 0x7}}}], [], @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x9, 0x4, 0x8848, 'syzkaller0\x00', 'veth0_to_bond\x00', 'nr0\x00', 'batadv0\x00', @empty, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @local, [0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0x9e, [], [], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x3}]}, 0x3c2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1194.162579] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:36 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0x22) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1194.235321] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1194.266368] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:36 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000000c0)={'nr0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr(r0, &(0x7f0000000040)=@random={'user.', ',-\xb6!mime_typemime_typelo\x00'}, &(0x7f0000000080)='nr0\x00', 0x4, 0x2) 03:41:37 executing program 0: pipe(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x10802, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet(r0, 0x0, 0x0, 0x80000) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4200, r1, 0x0, 0x0) tkill(r1, 0x22) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000080)={0x1}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1194.401386] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:37 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) [ 1194.505693] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1194.530755] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:37 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(r0, 0xffff, 0x5, &(0x7f0000000480)="33bdf51c6766bc32ee89226db6d9cea3ad9ecb79a725a89cc04144b168b6a4467fd6369197bc0044a3636389c6d32a23f4dc5a136655c8b6e353a46299777d8278e7ec48a5ea7ba7854531331ffd5358b731737b8318c6d2532ca84447fabef704387319b69fdecf33afc4dfdf07be5b0fdf64ba689a91c41a3485ceabc784c099031e63082cef563f5e46cb632e936365ec49616838ceb891095ac96127e4e0d4f5a5dc6a0107234758b2d09583f576f3c5f23dec714e7b23a01dac52ebabdae3c61b118fe6dd9ab2e4cd", 0xcb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x8000, 0x0) write$selinux_user(r1, &(0x7f0000000100)={'system_u:object_r:hald_var_lib_t:s0', 0x20, 'user_u\x00'}, 0x2b) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1194.583245] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1194.627243] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1194.733986] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1194.787094] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1194.856246] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:39 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:39 executing program 0: pipe(0x0) pipe(&(0x7f0000000280)) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9f, 0x9f, 0x6, [@ptr={0xb, 0x0, 0x0, 0x2, 0x4}, @ptr={0xa, 0x0, 0x0, 0x2, 0x4}, @fwd={0x9}, @volatile={0x1, 0x0, 0x0, 0x9, 0x2}, @func={0xf, 0x0, 0x0, 0xc, 0x1}, @func={0x9, 0x0, 0x0, 0xc, 0x4}, @datasec={0x3, 0x6, 0x0, 0xf, 0x3, [{0x3, 0x4}, {0x4, 0xfffffffffffffffe, 0x8f9}, {0x3, 0xc, 0x8}, {0x5, 0x10001, 0x1}, {0x2, 0x0, 0x526d}, {0x2, 0x1ff, 0x7}], "48e8f2"}]}, {0x0, [0x61, 0x61, 0x5f, 0x30]}}, &(0x7f0000000180)=""/117, 0xbe, 0x75, 0x1}, 0x20) read(r0, 0x0, 0x279) socket$inet(0x2, 0x4000000000000001, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x800) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, &(0x7f0000000580)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4200, r2, 0x0, 0x20) tkill(r2, 0x22) clock_gettime(0x0, &(0x7f0000000080)) nanosleep(&(0x7f0000000040), 0x0) 03:41:39 executing program 3: pipe(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) 03:41:39 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) mkdir(&(0x7f0000000200)='./file1\x00', 0x80) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) write(r0, 0x0, 0xffffffffffffffcd) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x4) tkill(r2, 0x22) ptrace$getsig(0x4202, r2, 0x0, &(0x7f0000000240)) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:39 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)="da4347c25fb3f306f3bd15111019e5cd4a3fa64889cf104ea0c646738e4f560a7c21ee332eef2fa4d4562006ae343aa8dc98fa0a83c75ee937b1b59aee0b6c727b597380596ba07b28db6105c3c1bfc77276dadd6bc28353cb55247f95d852c541c077aeef37083025e5ee25b24e46a632421862dd695d09f55a7677ced6053d71635a46a8dd31cc2d3a", 0x8a, 0xfffffffffffffff9) r2 = add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000480)="c32abd2ca79cf86be99a311dca9c51a1dafccff4158b4d467765e9603b5f64da0c14b5d99c57664e867e579413dfa6acfb67843278d1a882211b17d545de1e515dffe6039b8716e0b5a9127673116804440d8a4a78642001138c31c81276adf76188434e41e4ac5f54a72b894c0fda7d8b5e4b9fe7410770b3942e788c4c8d9e480eb7006033d2fa947354672a47c5d2ab5cc9d27943362dad9b1348aa0d888f8e32237ae875", 0xa6, 0xfffffffffffffffb) keyctl$reject(0x13, r1, 0xd6f, 0x1, r2) 03:41:39 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) lchown(&(0x7f0000000100)='./file0\x00', r0, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000080)=[0x1000, 0x9b0f]) rmdir(&(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1197.297730] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.302466] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.335628] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:40 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/1) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1197.486109] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:40 executing program 3: pipe(0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x3, @rand_addr="4602aa12c4dc9c724f3697005d69bbba", 0x6c}, 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000280)) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x710, 0x70bd2d, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000) clone(0x10008500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0xa) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1197.544230] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.555049] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.565175] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.651142] audit_printk_skb: 3 callbacks suppressed [ 1197.651156] audit: type=1400 audit(2000000500.283:73): avc: denied { create } for pid=22895 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:40 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x7, 0x4, 0x470, 0x270, 0x0, 0x0, 0x388, 0x388, 0x388, 0x4, &(0x7f0000000080), {[{{@arp={@local, @remote, 0xda97c50f0e1d887, 0xf851cc08c560c75c, @empty, {[0x0, 0xff, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}, 0x2, 0xfffffffffffffffb, 0x1000, 0x16d37d7e, 0x7, 0xffffffffffff823c, 'vlan0\x00', 'veth1_to_hsr\x00', {}, {0xff}, 0x0, 0x18}, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x78f5, 0x2, 0x5}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x26}, @dev={0xac, 0x14, 0x14, 0x21}, 0x737aed24e1438371, 0xffffffff, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0x0, 0xff, 0xff, 0xff, 0xc3ebd441fd3281ad, 0xe7abde060e95e047]}, @empty, {[0x0, 0xff, 0xa7dbd9ab2333efcc, 0xff, 0xff]}, 0x2, 0xfffffffffffffff8, 0xd67, 0x377f062b, 0x4000, 0xa7, 'bond_slave_1\x00', 'dummy0\x00', {}, {0xff}, 0x0, 0x20}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@random="e9dd566f758f", @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x8, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x5}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1197.684997] audit: type=1400 audit(2000000500.313:74): avc: denied { write } for pid=22895 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1197.717562] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.732627] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.765984] audit: type=1400 audit(2000000500.393:75): avc: denied { read } for pid=22895 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:40 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r1, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="bec65a7ec7ca0eb38db30808a3bd9390"}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000801}, 0x40004) 03:41:40 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000080)='./file0\x00') r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r2 = dup2(r0, r0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000480)={0x7, {{0xa, 0x4e23, 0xe8, @local, 0x5}}, 0x0, 0x5, [{{0xa, 0x4e24, 0x8000, @rand_addr="c54061ff97f9d8e12c25fdf3dc979e95", 0x4}}, {{0xa, 0x4e24, 0x2c22f878, @rand_addr="6f3790d77241e72e90650399d3812912", 0x5}}, {{0xa, 0x4e21, 0xfffffffffffffffe, @local, 0x7}}, {{0xa, 0x4e24, 0xc6b9, @rand_addr="7bb54f0cfde20ece6e9b8474fb920b0e", 0x81}}, {{0xa, 0x4e23, 0x3, @mcast2, 0x4}}]}, 0x310) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1197.799271] audit: type=1400 audit(2000000500.423:76): avc: denied { create } for pid=22895 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1197.827812] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.852594] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.878225] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.926634] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1197.937886] audit: type=1400 audit(2000000500.563:77): avc: denied { create } for pid=22906 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1197.965075] audit: type=1400 audit(2000000500.593:78): avc: denied { write } for pid=22906 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1198.039355] audit: type=1400 audit(2000000500.663:79): avc: denied { read } for pid=22906 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1198.071971] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1198.080203] audit: type=1400 audit(2000000500.713:80): avc: denied { create } for pid=22906 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1198.081287] audit: type=1400 audit(2000000500.713:81): avc: denied { write } for pid=22906 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1198.097101] audit: type=1400 audit(2000000500.713:82): avc: denied { read } for pid=22906 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c705000000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:42 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) r2 = getpid() r3 = getuid() r4 = getegid() r5 = gettid() r6 = geteuid() stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000680)={0x0, 0x0}) getresuid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) stat(&(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r13 = getgid() r14 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f80)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000010c0)=0xe8) r19 = getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001100)=0x0) getresuid(&(0x7f0000001140)=0x0, &(0x7f0000001180), &(0x7f00000011c0)) fstat(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = getpid() lstat(&(0x7f0000001280)='./file0/file0\x00', &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f00000014c0)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000080)="114191f4caea167dbfbffa49fdb3511810968c6b6a49f3e08a3ce909f42a46e330ddfc2742d7b70c347330557a748b39", 0x30}, {&(0x7f0000000100)="43c974b10339e61c8eb7c3bfb0b2ba5d7a8cf38172af9f054a475f4aeb88278dbd03", 0x22}, {&(0x7f0000000480)="b3a0e95f65418180db78d1fa9c9955be3a5c55460eec157af47b0fcc9b2470354973677dd6e0847bfeefc6efe8b3b526ead9c81274f1c1f96fd6cc41a9cd5bb06f30b2d4b357f5215486c5a93cf23afd6c3379377e5233b6e0cfa877e14d1bd25703b7749f8989156b6daedc825df2f0ad5142827a7fe5d250e050215afe642ac6029c527646eaaa549b08b7809fa6c8ae30b53a1caa75a183d07a7f04331b5575d601744b3c68b1aec719dc6b8011adabc1f67dfd2a6cec62dc5050d3", 0xbd}, {&(0x7f0000000540)="da2f039d6d79c957", 0x8}], 0x4, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @rights={{0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}}], 0x130, 0x4}, {&(0x7f0000000c40)=@file={0xa66518a8ed7a3ebb, './file1\x00'}, 0x6e, &(0x7f0000000e00)=[{&(0x7f0000000cc0)="f5f1e8d0c942d10a1c5411c79f2772997c4a37fa0d6f5db1a836a2eae4d9af970ac4", 0x22}, {&(0x7f0000000d00)="5a0ad74c333c156e778fe416f3bd6ab427540d787a85fac2978fefd419c607c90e05bc5a4776c7eb359aecba169d0dc242ff3bc6955990b8729728bee686bd45ae868cb6f113d0f5b2ab3e6ce2b3e8995dc2e05626fcb8", 0x57}, {&(0x7f0000000d80)="80e0733acc0b9f3d0b24729e3e7a2a314dcc5a64bce0e0873ff8a56de23e8b5a84d222a440c8032ee13bff6746be202c755a8e5333d9caf36fa248dcd2c70c05e3fba8b04ae282b8be1fa55e1941022765425aa05b35b633ca68cb2f4f84fcef092ef1483f22eda7c8", 0x69}], 0x3, &(0x7f0000000e40), 0x0, 0x4}, {&(0x7f0000000e80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000f00)="04ea2ffa4825c9cd17f518cf50e4b838c51a0952a8c69b27bf642690e1fe4ebada25dfccf682b54c41263e8051ae833700ac069bc1388288e0", 0x39}], 0x1, &(0x7f0000001400)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="00950000000000000000007f000000000f000000", @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25, @ANYBLOB='\x00\x00\x00\x00'], 0x88, 0x810}], 0x3, 0x8000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r26 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r26, 0x0, 0x0) tkill(r26, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:42 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @empty}, {0x2, 0x4e20, @multicast2}, 0xa1d34e9e08afb334, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)='dummy0\x00', 0x0, 0xef, 0x401}) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) 03:41:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x10) pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:42 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1200.316442] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.353004] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:43 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:43 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x2000, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x7fffffff, 0x4, 0x10001, 0x3, 0x0, 0x100000000, 0x18, 0x7, 0x401, 0xe6, 0x0, 0x7, 0x3, 0x200000000000, 0x8, 0x101, 0x101, 0x5, 0x200, 0x7ff, 0x7ff, 0xfffffffffffff576, 0x8, 0x1b2, 0x9, 0x4, 0x7f, 0x7e52, 0x8, 0x100000001, 0x7fff, 0xffff, 0x1, 0x7, 0xffff, 0x81, 0x0, 0x1, 0x1, @perf_config_ext={0x7, 0x7}, 0x1, 0x401, 0x81, 0x4, 0xffffffff8eab68a9, 0x400, 0x1}, r0, 0xffffffffffffffff, r1, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4200, r2, 0x0, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:43 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') pselect6(0x40, &(0x7f0000000040)={0x8, 0x100000001, 0x0, 0x100000, 0x2, 0x0, 0x8, 0xe244}, &(0x7f0000000080)={0x5, 0x5, 0xa864, 0x7f, 0x7fff, 0x8000, 0xad3, 0x765a}, &(0x7f00000000c0)={0x29, 0x7, 0x7, 0x79c2, 0x7, 0xa23, 0x7, 0x4}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={0x3f}, 0x8}) 03:41:43 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:43 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./file0\x00', 0x90000, 0x20) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x40, 0x101) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1200.524926] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.545408] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.547378] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.572370] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.589615] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:43 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x3f, 0x3, &(0x7f0000000240)=[{&(0x7f0000000100)="7791f575604ad0387b2498c073d54d9133badb5cea24a08ca7e269c73a6d275cc9669a01877795d100b52cb16452f8d0e6812bc0a48a92e636f7514be21e5c4e91eba0f8f2f577394d4f464c26cd55b53767ff3bc2a3218bfc40c9392759d7155c84a2809e745283d350909342b9b335bb8e5d9936605371d2f8bd8c792122de", 0x80, 0x1}, {&(0x7f0000000180)="44c90f16c6f092b9a66613232a873f37368eba73cea7f6cf0a7cdc5d9532760f739ba91890eb5b7f59f2048b15a423f980bbc889b36ed85ee06a910a3a46f73769b7cad555698db67d8a0ff276266553ca1d72ceee9b27adae542bbcd0ce2545778d3c359b99b6fdf4dc6d268e6624ea7a0564fc0b723002cb62487c78f698d4a147e237d9095c09f95c0f8b00f928a9b96f2dd932af7e41c00c8c2d5bb556c41bb582436e8afc2deecf3f41786c49fbe99c55d9ac473ca4", 0xb8, 0x8}, {&(0x7f0000000480)="93c30b1be676fe30650281d30302d65b53802fa8c6bd1bfcd293279ac146e39fd4edb937bd47fc605778a96ae3d5737cf2780ce6a4ff5b4484a9856e6ca819c428b099239f81b7364dca7a3e1fee9fea5883e01bb0f0c3bf86ce31b3599a9071a07295f29480e25ccf6b61e22ae413890a2352415514f7708df82b9a86ac31bbf83e5fda1ae6b354dbf9678172c0e3586dab7a1fcf1a63f4d82ee1ab110502582d6540cb6a3076de75ee93018b1177f9af928668bac1fae555e536e4ddd922949c76c692024519293062fe344310eb4afffee90db5e236d32f833c93", 0xdc}], 0x20010, &(0x7f0000000580)={[{@fastboot='fastboot'}, {@user_xattr='user_xattr'}], [{@obj_role={'obj_role', 0x3d, ':'}}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'system[procem0/%GPL\x0e@vmnet0+'}}]}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:43 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x102) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1200.697692] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.699639] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.718435] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.772189] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.822075] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.873593] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.895586] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.914590] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1200.958794] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c705000000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:45 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:45 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:45 executing program 3: clone(0x100, &(0x7f0000000040)="46858b2aeb9cce8725afe1050191af5ca2d305930318fb287a835aa9bded89c727cc0b1ee0b6f95517e70a975eabe1ed824b655565f46a3ce59ba93271d08ce6491b8c4551af4c4999c6328c77edb3b4fe6705ed2321bd45a97bdbb6b625d7cb763235463ecc5f3f06bf9733335163ccf4991500ca9b4843a6f93d8d189091a25454731dd86ce4da7853f3c329da94679a40960cacd192e911eff7c86320f09ae8043541d6891a834a6e9f058a68b4084552b2b04684df0ac9f4b72295f40acdcdf62a07", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9fb4a1eb00869b4881fcbc2eb7cc1d2817c56587cdc16200ca9f5fe8b67f46a59812054b7b6c629b4205dc37877bdac2bf890bd763f7c48a7752afcb37e0e11397e39e41594569e251ace60d1b0aaaef2002191f") pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = geteuid() mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x1, &(0x7f00000005c0)={[{@mode={'mode', 0x3d, 0xee}}, {@mode={'mode', 0x3d, 0xffff}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xece}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x1}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe'}}, {@uid_gt={'uid>', r0}}, {@obj_type={'obj_type', 0x3d, 'vmnet1'}}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x2000000, &(0x7f0000000480)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:45 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:45 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x8004, &(0x7f0000000100)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ\xdb\ftMr\xbf5\xc1\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\x02\x00\x00\x00?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l\xf5Z=\xb7\x8d\x0fgw0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:46 executing program 3: pipe(0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendto(r1, &(0x7f0000000080)="243771a8b54701d50b93a27467447659dc7ce6b024337b9aef9f368442b8b319dbae81097ddaf0b22218132adf4a4225957f3b57890bc177bf75cee0d94ce52441a63f14c110eed33f90c60f4f30f95b66f1384da63c0e473c0aaa92ec9031194efffeb27745579e6c6f612952ae9bbce2e77a917ef3909f26a4abb15ed7301ed6019c9b3e1063d4151765290b2f25b1296fdf4581c21f4bca9f8b4a297d33887d8b71784c678ec4412885b3a7619205784fbfe324272510cb29ba71f0e127b06c98eba866c81c08a4237ab4e398df578cb5672bfc476af20a1286b5e2f0f0648201d15feefb1afd", 0xe8, 0x40001, &(0x7f0000000180)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e21, 0x4}}, 0x80) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:46 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0xc000000000000, 0x2, 0xfffffffffffffffb, 0x2b0ba46, 0x0, 0x8001, 0x1000, 0x5, 0x5, 0x9, 0x1, 0x31a, 0x1, 0x0, 0x1, 0x3, 0x3, 0xc723, 0x1000, 0xffff, 0x6435, 0x81, 0x9, 0xd7, 0xfffffffffffffffe, 0x4, 0x1, 0x0, 0x1, 0x5, 0x100000000, 0x3f, 0x10001, 0x4, 0x7, 0xfffffffffffffffb, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0x10259, 0x7ff, 0x200, 0x3, 0xffffffff, 0x49a}, r1, 0x6, 0xffffffffffffffff, 0x1) fcntl$setflags(r0, 0x2, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000480), &(0x7f00000004c0)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xa) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1203.391893] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.422572] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:46 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='cgroup2\x00', 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffff8) keyctl$reject(0x13, r1, 0x9, 0xc8, r2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x400, 0x0) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x1) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1203.460632] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:46 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x119000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000100)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, r1, 0x4, 0x2}, 0x10) [ 1203.530854] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.557324] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.594153] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.632085] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:46 executing program 2: clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={r0, r1+30000000}, &(0x7f0000000180)) write(0xffffffffffffffff, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0x4) read(r2, &(0x7f00000004c0)=""/250, 0xfffffffffffffd55) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x208, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1203.655732] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.685083] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:46 executing program 3: pipe(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) chown(&(0x7f0000000200)='./file0\x00', r1, r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x801, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000680)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=""/10) lsetxattr$trusted_overlay_origin(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='trusted.overlay.origin\x00', &(0x7f0000000740)='y\x00', 0x2, 0x1) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)=""/215, 0xd7) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f00000005c0)={@rand_addr="246f675e9917610b145d07ddbc3c19a2", 0x80, r0}) ioctl$TUNSETOWNER(r4, 0x400454cc, r1) [ 1203.701421] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.713208] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.830513] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZÛ tMr¿5ÁËš à^cØ éàê Y6 [ 1203.830513] Úþ†lÌ <üñ1:)O{¿êá" [ 1203.852189] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.867404] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1203.885962] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZÛ tMr¿5ÁËš à^cØ éàê Y6 [ 1203.885962] Úþ†lÌ <üñ1:)O{¿êá" [ 1203.937090] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:49 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffffe, 0x7}, 0x10) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c705000000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:49 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:49 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:49 executing program 5: write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x4e21, @multicast1}}) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:49 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@vsock, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/17, 0x11}], 0x1, &(0x7f0000000180)=""/241, 0xf1}, 0x100) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = gettid() perf_event_open(0x0, r2, 0xffffffffffffffff, r1, 0x9) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) syz_open_dev$sndtimer(&(0x7f0000000540)='/dev/snd/timer\x00', 0x0, 0x420002) 03:41:49 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ipv6_route\x00') ioctl$TCSBRKP(r1, 0x5425, 0x3000000) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:49 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') sysinfo(&(0x7f0000000080)=""/42) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0xffffffffffffff41, 0xffb5) [ 1206.484862] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1206.491298] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:49 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={r1, r2+30000000}, &(0x7f0000000480)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1206.505849] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1206.518517] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1206.549613] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:49 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x7ff, 0x2}) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) [ 1206.648627] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1206.789511] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:49 executing program 0: pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/63) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x8cb7384f820d07ff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt(r1, 0x3, 0xc9d, &(0x7f00000001c0)=""/31, &(0x7f0000000200)=0x1f) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x77359400}, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000100)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="00e059d71cbdd1b958d7baaf3a5036a5b7f2ee529bd285a12959124ffd4b27fbb9e660ebb0fe60b58d1b0bd3f372da2109f4173a833e81a17db60e7163e2901f83c23ee869c25c7d80c6088a3ee64895f09da7bc62e2aa7cfb1d6ab301063d1ab8d278ec95fa9f4fa4e157e78f6fd8d2695c4cd952115f033f26de933f0d535d223384f1bd7fdbe50564fa2b93dcb25c573f324d3557c896dd3e3d38f8f2a400", @ANYRES16=r3, @ANYBLOB="040028bd7000fcdbdf2507000000340006000800010009000000080001000800000008000100020000000400020008000100000000000800010005000000040002002800040024000700080003004ed500000800040008000000080002000200000008000400030000005c000700080002000080000008000200000000000c000300070000000000000008000200090000000c00030080000000000000000c00030000800000000000000c0003000300000000000000080001000400000008000100c1ffffff"], 0xcc}, 0x1, 0x0, 0x0, 0x4800}, 0x0) pipe(&(0x7f0000000080)) [ 1206.861001] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1206.868310] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:49 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x408900, 0x40) r3 = dup2(r0, r0) linkat(r2, &(0x7f0000000100)='./file0/file0\x00', r3, &(0x7f0000000180)='./file0\x00', 0x1400) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r4, 0x2, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x9}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x10) [ 1206.904790] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:49 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x16a40, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x418, 0x1e0, 0x1e0, 0x1e0, 0x0, 0x1e0, 0x380, 0x380, 0x380, 0x380, 0x380, 0x4, &(0x7f0000000080), {[{{@ip={@rand_addr=0x7, @remote, 0xff000000, 0xffffff00, 'dummy0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x0, 0x8}, 0x0, 0x1b8, 0x1e0, 0x0, {}, [@common=@unspec=@comment={0x120, 'comment\x00'}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@ip={@remote, @rand_addr=0x7f, 0xffffffff, 0xffffffff, 'nr0\x00', 'veth0\x00', {}, {0xff}, 0x32, 0x3, 0x4}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x22}, @loopback, 0xffffffff, 0xff000000, 'veth0_to_bond\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x2f, 0x1, 0x6c598a0ec7b68f95}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1206.964787] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1207.047221] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1207.060811] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:49 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) wait4(r0, &(0x7f0000000040), 0x2, 0x0) [ 1207.118308] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1207.135489] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1207.183928] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1207.196449] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1207.229294] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1207.274184] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:50 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e24, @multicast2}, 0x10) getpgrp(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect(r2, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x0, 0x1, 0x3, {0xa, 0x4e20, 0x2, @ipv4={[], [], @remote}}}}, 0x80) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:50 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(r0, 0x0, 0x0, 0x7fffe) write(r0, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x323) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r0, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:50 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x100a, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000014c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r2, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xea}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x71a}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xce1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x4008000) r3 = dup2(r0, r0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000001540)={0x0, r1, 0x8, 0xffffffffffffffff, 0x4, 0x7}) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000001500)) 03:41:50 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x5861b43, 0x4) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:50 executing program 5: r0 = epoll_create1(0x80000) r1 = socket$inet6(0xa, 0x3, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0xfd, 0xfffffffffffffff8, 0xc1ca, 0x2b84}) r2 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r2, 0x0, 0xa12d70393ab62a8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r5 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x40) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000200)={0x9, 0xffff, 0x1, 0x9}, 0x10) getsockopt$inet_buf(r3, 0x0, 0x24, &(0x7f0000001480)=""/4096, &(0x7f0000000240)=0x1000) mkdirat$cgroup(r4, &(0x7f0000000180)='syz1\x00', 0x1ff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() openat$cgroup_ro(r5, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGREP(r5, 0x80084503, &(0x7f0000000480)=""/4096) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r6, 0x0, 0x100000010) tkill(r6, 0x12) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101000, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:50 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs$namespace(r1, &(0x7f00000001c0)='ns/uts\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000180), 0x0) [ 1208.027894] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.053808] audit: type=1400 audit(2000000510.673:83): avc: denied { create } for pid=23114 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:50 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect(r0, &(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x1, {{0x1, 0x4}}}, 0x80) r1 = gettid() prctl$PR_GET_TIMERSLACK(0x1e) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:50 executing program 3: pipe(0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000040)=0xfffffffffffff1fa, 0x4) ioctl$TIOCCBRK(r0, 0x5428) signalfd4(r1, &(0x7f0000000100)={0xffffffff}, 0x8, 0x80000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f00000000c0)='./file0/file0\x00', 0x400800, 0x20) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1208.059609] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.110226] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.246281] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:50 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xc881) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000080), 0x1, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x9, 0x9, @udp='udp:syz2\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:50 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1) clone(0x2080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) [ 1208.258752] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.268912] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.277296] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:51 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)={0x68, r1, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x0, 0x31]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8001}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x101}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x11}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1000}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0xc080) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:51 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) read(0xffffffffffffffff, 0x0, 0xffffffffffffff55) r0 = socket$inet(0x2, 0x4000000000000005, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1208.403630] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.435319] audit: type=1400 audit(2000000511.063:84): avc: denied { create } for pid=23147 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1208.465559] audit: type=1400 audit(2000000511.093:85): avc: denied { write } for pid=23147 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1208.499211] audit: type=1400 audit(2000000511.123:86): avc: denied { create } for pid=23149 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1208.524864] audit: type=1400 audit(2000000511.153:87): avc: denied { read } for pid=23147 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1208.527548] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.531195] audit: type=1400 audit(2000000511.163:88): avc: denied { create } for pid=23147 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1208.532362] audit: type=1400 audit(2000000511.163:89): avc: denied { write } for pid=23147 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1208.546984] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.627322] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.672482] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.687050] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.780280] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.802883] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1208.899696] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:53 executing program 2: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) write(r0, 0x0, 0xffffffffffffff2f) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) write$binfmt_script(r1, &(0x7f0000000480)={'#! ', './file0', [{0x20, '/proc/self/attr/current\x00'}, {0x20, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe'}, {0x20, 'GPL#*('}], 0xa, "6e20dcf207b23a577b8e88bee894dd7e7c1a49d7ceb95a76c79f19c41905574131d4adf14807b91a55f7132f7f71fc0587206630d51c6123d9856ed92d9db0aa29179987b40c7de82b57c97157564be52fa42de7a609512576ae6054457294e18287dfcfcfee342968a3863db9c3d87de50799e6bcf0b1f4c4cc0e72ae9ed6ed13affb9b4eda893410571f26b33b2f44cc25a2d5c4668c75640303b9fd18b2b1526932337ea03e0483e4730a27c7272fc98e912b"}, 0x200) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:53 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(r0, 0x0, 0x0, 0x7fffe) write(r0, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x323) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r0, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:53 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000100)="931ae20fc78704c028ec89054c6602bbe85e07ec7aa9cf8ea5df5f57e67eac29b91a0ef07991e6ce1a2608255da5edc5c03d1751656bb94db41b92ceeb22bbcec9ba0aeeb1525d7e3fde93893e3caaef80a6b7b03fb6a0162fcb8fb033b8d71fa7e52c06739aa06cf19b5e8bb85273ad61bad3a217bccad0f1bc4cd312ba1701048a", 0x82) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:53 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x1, 0x3, 0x3f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:53 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0xfffffffffffff217, 0x1, 0x8, 0x3, 0x0, 0xf17, 0x10000, 0x1, 0x1000, 0xf00e, 0x8, 0x400, 0x10000, 0x100000001, 0x80000000, 0x1, 0x3, 0x7, 0x9, 0x0, 0x1, 0x9, 0x100000000, 0x9, 0x5, 0xfffffffffffffff8, 0x5, 0x7fffffff, 0x5, 0x3, 0x4, 0x6, 0x6, 0x9, 0x7, 0x0, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10000, 0x7, 0x1c85d41d, 0x8, 0x24, 0xe8, 0x2d4}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x4a45) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='hpf\xa5#', 0x0, &(0x7f0000000600)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = epoll_create1(0xa0ba4115aea9b431) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x1}, 0x28, 0x0) statfs(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000740)=""/4096) openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x7a28d5de816c9440, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x6, r2}) [ 1211.034673] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.056886] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:53 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x50000, 0xe3) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000100)={0x131, 0x4, 0x2, 0x9}) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1211.104122] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.248919] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:53 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000040)={{0x1d, @local, 0x4e22, 0x1, 'dh\x00', 0x20, 0x3, 0x48}, {@multicast2, 0x4e21, 0x0, 0x7fffffff, 0x10001, 0x101}}, 0x44) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:54 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setregset(0x4205, r0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="175229ca5e7ae1ca1bdb0c644a20ce715b8613b490144e44b7b4b23b6900ee59", 0x20}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000080)={0x6, 0x2, 0x3, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1211.446208] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.458114] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:54 executing program 0: pipe(0x0) r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) munlockall() tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:54 executing program 3: pipe(0x0) r0 = epoll_create1(0x80000) r1 = dup(r0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x303}, "b5065fd8f3f47609", "8ca22d9dfb6efb4d11ee8875eaf11b6a", "be13c20a", "83c7d21354a5cb05"}, 0x28) mkdir(&(0x7f0000000040)='./file0\x00', 0x40) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, &(0x7f0000000480)='\x1a\xa86\x8a\x9b\xf8]\x91Wc\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ\xff\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r \xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*\x05?\xb5}9nF\x88\xc4\xd5u+\x8e\xe2\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe\xff\xce\xafAg\xae\x06)U\x92\x8f.\x87\x83\xe7r\xad ,\xcb\xb7\x83\a\xf2P$YQ5F\xdb>R \xd5V\xd5U)?eE\xa4\x91>\xd4\xce\x91!v\xf7*F\xe9\xd1\x1d\xe04\x16\xa3\x82\xd6\x12\xd0\x17\v\xca\xcd\xe2\xc3\xfc\xa6bm*\a\x9f|\xb6\xdf6\xf1\xbb\rv\x8a\x12\xc04Ns\x830P\x96p\xf8\xee\xfa\xbe \xa8h\x861\xd6\xbc\x87\xa7O\n\xbf)\x9a#h\x80%A\x9c\xcbj\xc7\x83\xc6\xa7\xf8\xb8F \a#\x1e\x00\xd2\xf8fP\a\xa7\xe3\xb5\x7f(\xfeI') [ 1211.529544] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.566774] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:54 executing program 3: pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000080)={0x1f, 0x5, 0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0xfffffffffffffff5, 0x6, {0x100, 0x4, 0x0, {0x6, 0x2, 0x1e, 0x9, 0x1, 0x1, 0x5, 0xca, 0x2, 0x12000000000000, 0x7f, r2, r3, 0x2, 0x1}}}, 0x78) 03:41:54 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x604142f78d3b06a9, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400000, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000080), 0x4) [ 1211.627593] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.634481] cgroup: cgroup2: unknown option "¨6Š›ø]‘Wcše!­?šteéòcÎZÿš" [ 1211.646381] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.700957] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.719923] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.728952] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1211.763880] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:56 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(r0, 0x0, 0x0, 0x7fffe) write(r0, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x323) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r0, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:56 executing program 0: pipe(0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) accept4$inet(r0, 0x0, 0x0, 0x800) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() getsockname(r0, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x80) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x4000, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000280)={0x6, &(0x7f0000000240)=[{0x80, 0x1, 0x4000000000000000, 0xa31}, {0x10001, 0x6, 0x7fff, 0x60}, {0x3, 0x80000001, 0x80000000, 0x9}, {0x2, 0x0, 0x1, 0xfffffffffffffcfa}, {0xf38, 0x200, 0xffffffffffff4692, 0x101}, {0xecfa, 0xec98, 0x7, 0xe9}]}) rt_sigtimedwait(&(0x7f0000000040)={0x5e}, &(0x7f0000000100), &(0x7f0000000080), 0x8) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:56 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000200)={0xffffffffffff0001, {{0x2, 0x4e21, @multicast1}}}, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', r2}) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:56 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x4) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='cgroup2\x00\xcb\xdb\x97\xdd\xb5%\xedC\xe1|\xda\xb9\xe9\xe7\xdaO\\sL\x868\xcb:\xfd\xb6\x86y\x0f\xa6\x95\xbf\xa4\xf9\xc3\xcd\xe9\x88U\xc5\xa4\xda<\xa3_\xbe=\xe0U\xc5\xfb\xd8\xb0kf\xeedX#\x00'/81, 0xefe7398e0d20e90, &(0x7f00000001c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x80\x00\x00\x00\x00\x00\x00\x00\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x03\x00\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0xd9a3ab0cf8012b46) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() getresgid(&(0x7f0000000140)=0x0, &(0x7f0000000400), &(0x7f0000000440)) getresgid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) r6 = getgid() stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000840)=0x0, &(0x7f0000000880), &(0x7f00000008c0)) setgroups(0xa, &(0x7f0000000900)=[r0, r1, r2, r3, r4, r5, r6, r7, r8, r9]) [ 1214.149307] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:56 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000100)={@dev, 0x0}, &(0x7f0000000180)=0x14) sendto$packet(r1, &(0x7f0000000080)="0cc0a5c96110a8dd16", 0x9, 0x40000, &(0x7f00000001c0)={0x11, 0x8, r2, 0x1, 0x8, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:56 executing program 3: pipe(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x6) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:56 executing program 0: pipe(0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4002, 0x0) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000100)=0x10, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:56 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x80) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x3) [ 1214.277017] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.311358] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.355017] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.364587] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:57 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0x3e65eb6b14504b15, &(0x7f00000000c0)='\x9bB\xd0t\x9b\x03?&\xcc\xa2\xaa\xca\x89\xc1\xe7\xb7\xe9\xff\xb4\x84\x19\x8e`\xe9\xfayt\x94\xc0\r\xe1\xa8\x8cC\x8f\x1d\x85\xc7\xe0(\xb5\xe3Z`\x16\xabF\xf7!\x99\xbaYO?\xa1\xb8\xda\x00t1\xcc5\xda\"Iq\x84\xe6I\xdc\x0es]z~\'g\xbb\'\x94\xc1w\xd4\xb3\xbb\x8b\x8f`\xb3Z\xb8\x04\xc8\xb1q\x10=\xfel\xd0tY\x18E\x8a\xdd\xb9J\x9b\x96\xdd\x1a\xe6\xcaA\xb4R\xb5\x1d\x80\xc0\xa2\xa7\x80`jB`\x1b\xa7\xd0\xe9\xdb\xabb5\x96\xfe<\x0e9\xcbV\xf5z\xaa=a\xd3\x13\x97\x05q\xe2\xa4g\xce\xb8\t [\xa4\xa7\xf6\x1d\x13\x86DH\xe6QN\x95\xe6\xf9\xa8~'}, 0x30) ioctl$void(r1, 0x5450) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0xfdcbaf49e391213b, 0x7f, &(0x7f0000000200)="bb4e1678ea56560f333e67cef12dcf8d0e077c800891d48c11fe545293da1e6adde062200ec17003555d09819e079eb5b6c78a08c0cc3354ce8631d02cf967a8ab1f56ea242cc617e5984195323744072ce0a1864d0c5d5078466d0165c318324c98538d58e3ba27873079138282fc9acd36ae00eb226de548235715f6a77a"}) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0xc87, 0x4) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000480)='./file1\x00') ioctl$TCSBRK(r0, 0x5409, 0x6) 03:41:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/101, 0x65}, {&(0x7f0000000180)=""/62, 0x3e}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/53, 0x35}, {&(0x7f0000000480)=""/226, 0xe2}], 0x5, &(0x7f0000000580)=""/41, 0x29}, 0x7f}, {{&(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000640)=""/29, 0x1d}, {&(0x7f0000000680)=""/134, 0x86}, {&(0x7f0000000740)=""/51, 0x33}, {&(0x7f0000000780)=""/211, 0xd3}, {&(0x7f0000000880)=""/140, 0x8c}, {&(0x7f0000000940)=""/134, 0x86}, {&(0x7f0000000a00)=""/192, 0xc0}], 0x7, &(0x7f0000000b40)=""/53, 0x35}}], 0x2, 0x2, &(0x7f0000000c00)={0x77359400}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40)={0x0}, &(0x7f0000000c80)=0xc) fcntl$setown(r0, 0x8, r1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000d00)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x1c, r2, 0x8503b827b13f10e8, 0x70bd29, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004001}, 0x20000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1214.397174] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.423711] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.492026] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.494255] audit: type=1400 audit(2000000517.123:90): avc: denied { create } for pid=23304 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006a80)='rdma.current\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000006b00)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000006c00)={&(0x7f0000006ac0)={0x10, 0x0, 0x0, 0x20008002}, 0xc, &(0x7f0000006bc0)={&(0x7f0000006b40)={0x68, r1, 0x1, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x3, @media='eth\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x0) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)="222cf81c3f8b6b5749d25a7b5bc958239dd4f4787ecbeadef9d91cf0fb93489f11e6492b8e77e1bb661814bab6738906009356d6a64cfa938621ebcb5e2e8c3b846d60ef9635d21215ca74b1ab9d56f210f1241076f922d57587cabb132f71d1c875b51932c9df79892609f88c6545af7a8a78672a24fff58bef0482", 0x7c, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={r3, 0xab, 0x2}, &(0x7f00000001c0)={'enc=', 'oaep', ' hash=', {'cmac-aes-neon\x00'}}, &(0x7f0000000480)="60d87a277f91990c6d43969a66bcb664a1432ed46ed83904efcdc4d23a3a0910071797b1a853ab76fdce64b71e9d330d8d19b65a3b82794fe440a20c5feef3eb259e944cce861fadec19ba6e3fa9b48a7085d75894b589e4ea5ec621be88f5c04565e712d4e2e9b7e15a75acedc0cb26d17e643c47e4c7222ba91d9f31419fe8fc701753322e6314cce8b433819d68260eb5078cbadc80768488be32d1f6e3b5c38f4f47ac6d9f5422d526", &(0x7f0000000240)=""/2) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1214.494864] audit: type=1400 audit(2000000517.123:91): avc: denied { write } for pid=23304 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1214.566359] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.584855] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.686227] audit: type=1400 audit(2000000517.313:92): avc: denied { create } for pid=23319 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1214.689781] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:57 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1214.720515] audit: type=1400 audit(2000000517.353:93): avc: denied { write } for pid=23319 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1214.720872] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.773995] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1214.954529] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes 03:41:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:41:59 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:59 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = socket(0x4, 0x2, 0x7) fcntl$setpipe(r0, 0x407, 0x0) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4) 03:41:59 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) INIT: Id "4" respawning too fast: disabled for 5 minutes [ 1217.120427] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1217.187544] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:41:59 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:59 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) ioctl$TIOCSTI(r0, 0x5412, 0x8000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x102, 0x7) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000080)=0x10000) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:41:59 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fallocate(r0, 0x4, 0x40, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:41:59 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() getgroups(0x4, &(0x7f0000000080)=[0xffffffffffffffff, 0xee00, 0x0, 0xee01]) getgroups(0x3, &(0x7f0000000180)=[r0, r1, r2]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:00 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/134) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1217.321923] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1217.342996] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1217.352756] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:00 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000100)={@initdev, @rand_addr, @remote}, &(0x7f0000000180)=0xc) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000001c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) [ 1217.440300] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:00 executing program 3: pipe(0x0) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000040)='cgrou\xc1\xe1\xd7\x05\xa9h\xcc\xeb\xc2\x87mD9\xcc\fp2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r\a\x00\x00\x00\x00\x00\x00\x00O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\xff\x03\x00\x00\x00\x00\x00\x00l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:00 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) gettid() socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x2}, 0x28, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000140)='./file0\x00') r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1217.493351] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1217.514248] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1217.568837] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1217.620101] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:02 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000040)="6a5b0cc9ce43d0ba4363d5e4454168c23889e6135157bcaa93443082c0165e4058d129c3477a9489776864600c32") 03:42:02 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x133) getsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:02 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = dup(0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x2, 0x4, 0x48, 0x3, 0x3}) 03:42:02 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') inotify_init() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:02 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:02 executing program 3: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1220.157922] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:02 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000140)={'veth0_to_bridge\x00', {0x2, 0x4e24, @multicast1}}) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x400) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/sockstat\x00') r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000100)=r4) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x0, r2}) ptrace$setopts(0x4206, r2, 0x0, 0x0) timer_create(0x2, &(0x7f00000001c0)={0x0, 0x15, 0x4, @tid=r2}, &(0x7f0000000200)) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1220.205845] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.233803] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.255477] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.302867] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:02 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) set_tid_address(&(0x7f0000000100)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x80, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000480)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000080)=[0x8000, 0xffffffff]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:03 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1220.416481] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.419534] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x100) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x123) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') inotify_init1(0x800) 03:42:03 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x3e3c4f2c06d15207) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x7d199a79c7bd38f7, 0x4) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() r4 = geteuid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@smackfshat={'smackfshat', 0x3d, 'cgroup2\x00'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@subj_role={'subj_role', 0x3d, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe'}}, {@dont_hash='dont_hash'}, {@fowner_gt={'fowner>', r4}}]}}) [ 1220.554697] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.591858] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.652558] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:03 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/policy\x00', 0x0, 0x0) write$FUSE_STATFS(r0, &(0x7f00000015c0)={0x60, 0x0, 0x5, {{0x100000001, 0x4, 0x6, 0x6c, 0x2, 0x80000001, 0x5, 0x5}}}, 0x60) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) lgetxattr(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001480)=@known='system.sockprotoname\x00', &(0x7f0000000480)=""/4096, 0x1000) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000016c0)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000001500)='./file0\x00', 0x8, 0x2) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0x3) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000001680)=0x1c) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) gettid() mkdir(&(0x7f0000001540)='./file0\x00', 0x1b1) 03:42:03 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x242084, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:03 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 1220.723400] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.730656] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:03 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') unlink(&(0x7f0000000040)='./file0\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1220.791901] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.820912] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.863825] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1220.978385] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.055689] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:04 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, 0x0, 0x7fffe) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:04 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futex(&(0x7f0000000040)=0x1, 0x9, 0x2, &(0x7f00000000c0)={r0, r1+30000000}, &(0x7f0000000100)=0x2, 0x1) 03:42:04 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x8c43ec592812c16f, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x1010c0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) ptrace$setregset(0x4205, r1, 0x2, &(0x7f0000000080)={&(0x7f0000000100)="b83138c215694d569ddcda3a412836f3de9ec389be99c4852e465aad1fb53b367c9d5af763f3ff1a5cbc4e4574ddbf0cc259e370fcf80c435757f856a1d62b2fd66e62bcbb3bb86d957e5c6f604d3e8ca22029d232288590a8a9af8b81f55ab4186cd97b74b7a1ac7421d968fd3a5979f0e4ddeff4759b61967b96af9b83d467a749a312fa274c957d0854d8f26abbd32e82e845a51eeac30750c231f8c4e2041b73a81460eea60c9da3645d15ec72819a30d37ce7893e57bbbe116c4e674e851fa4a4b067f57427413e625c53091cb3646605715196fe66", 0xd8}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:04 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001340)={&(0x7f0000000f80)=@newtaction={0x338, 0x30, 0x400, 0x70bd25, 0x25dfdbfe, {}, [{0x324, 0x1, @m_simple={0x320, 0x5, {{0xc, 0x1, 'simple\x00'}, {0x27c, 0x2, [@TCA_DEF_DATA={0x124, 0x3, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe'}, @TCA_DEF_DATA={0x124, 0x3, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe'}, @TCA_DEF_PARMS={0x18, 0x2, {0x9, 0xe44, 0xffffffffffffffff, 0x40, 0x5}}, @TCA_DEF_PARMS={0x18, 0x2, {0x1000, 0x100, 0x20000000, 0x8, 0x7}}]}, {0x90, 0x6, "189029a299d931355a2e17169cbe73d9fd77afb7014fbc183e7f38a4a186001deafdf467aa3bc9e0b9cdff1213f28fcc9f68822df7f7066c1bda20a8f4ff9c8ee5942086e80b6afca768fe8964f1cbd14c89c87f60e6bc4079fb162f63c6ffbd0db38f2dcfafcf723599674cafecf38d4806b5b6eac66d8b811c43a15997b37680c8e4fcc1f57e417df4"}}}}]}, 0x584}, 0x1, 0x0, 0x0, 0x4044000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r2 = geteuid() quotactl(0x4, &(0x7f00000007c0)='./file0\x00', r2, &(0x7f0000000800)="e62b24da195b391ecb1916344fb2f5d1f6af57937d814ddcbd4b8f240f0cf9d293bf1cb6be57a207635de88f71bae8f9acccb7f6b015b14becffe04d6377775119acb8d8395fa8eb08581fafdd7c2819b4c9c7aadb198840b1358fba5c72508467cea0bb56793bd8ccf94ed47af8c699797d113b70a80f1075cc487e422fd7839943b9e81d4da10e1ec2d607f6846fdca28ec8e6a935c469e62d045c64f7a106670822815fe0760ce4ee20a753360d38a42ee161339a05f9a1810c7bd25bda6875bf8641c4ea9f4d10191b037b") ptrace$setopts(0x4206, r1, 0x0, 0x0) getpeername(r0, &(0x7f0000000980)=@can={0x1d, 0x0}, &(0x7f0000000a00)=0x80) sendmsg$nl_route_sched(r0, &(0x7f0000000f40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000f00)={&(0x7f0000000a40)=@newqdisc={0x4ac, 0x24, 0x600, 0x70bd28, 0x25dfdbfb, {0x0, r3, {0xb, 0x10}, {0x6, 0xc}, {0x1, 0xb}}, [@TCA_STAB={0x10c, 0x8, [{{0x1c, 0x1, {0x80000001, 0x8, 0x2, 0x9, 0x4700d9979d4205b1, 0x3, 0x3, 0x1}}, {0x8, 0x2, [0x0]}}, {{0x1c, 0x1, {0x30, 0x108800, 0x1, 0x3, 0x1, 0x0, 0x1f4d000000000000, 0x3}}, {0xc, 0x2, [0x9, 0x2, 0x5]}}, {{0x1c, 0x1, {0x9, 0x1, 0x4, 0x8, 0x3, 0xb38a, 0x8, 0x2}}, {0x8, 0x2, [0x7, 0x8000]}}, {{0x1c, 0x1, {0x9, 0x5, 0x1f, 0x661, 0x0, 0x1, 0x7, 0x6}}, {0x10, 0x2, [0x20, 0x40, 0x1, 0x6, 0x6, 0x40e5]}}, {{0x1c, 0x1, {0x1, 0x1f, 0x80000001, 0x6, 0x1, 0x4, 0x6, 0x1}}, {0x8, 0x2, [0x0]}}, {{0x1c, 0x1, {0x7, 0x6, 0x7fffffff, 0x6038, 0x3, 0x6, 0x7d, 0x2}}, {0x8, 0x2, [0xb5, 0x1]}}, {{0x1c, 0x1, {0x1, 0x6, 0xfff, 0x20, 0x1, 0x3b6, 0x6, 0x2}}, {0x8, 0x2, [0x6, 0xfffffffffffffffa]}}]}, @TCA_RATE={0x8, 0x5, {0x8, 0xb7a}}, @TCA_STAB={0x5c, 0x8, [{{0x1c, 0x1, {0x267, 0x800, 0x2, 0x7, 0x1, 0x1f, 0x98cc, 0x4}}, {0xc, 0x2, [0x6, 0x0, 0x0, 0xfffffffffffffff7]}}, {{0x1c, 0x1, {0x1, 0x3934, 0x3, 0x8001, 0x1, 0x1, 0x380000000000000, 0x8}}, {0x14, 0x2, [0x5, 0x81, 0x100000001, 0x100000000, 0xd2d, 0xffff, 0x5, 0x4]}}]}, @TCA_RATE={0x8, 0x5, {0x8, 0x4}}, @TCA_STAB={0x19c, 0x8, [{{0x1c, 0x1, {0x0, 0x6, 0x1, 0x6, 0x0, 0xfffffffffffffff9, 0x9, 0x3}}, {0xc, 0x2, [0x7, 0x7, 0x1]}}, {{0x1c, 0x1, {0x10000, 0x6, 0x6, 0x990f, 0x2, 0x5, 0x5, 0x5}}, {0x10, 0x2, [0x9, 0x5, 0x1, 0x100000001, 0x1000]}}, {{0x1c, 0x1, {0x6, 0xfff, 0x2, 0x400, 0x1, 0x101, 0xffffffff, 0x7}}, {0x14, 0x2, [0x6, 0x1, 0x100000000, 0x3, 0x4, 0x5fa, 0x86]}}, {{0x1c, 0x1, {0x0, 0x4, 0x5, 0x83, 0x1, 0x8, 0x1f, 0x1}}, {0x8, 0x2, [0xff]}}, {{0x1c, 0x1, {0x1, 0x83e9, 0x8, 0xfffffffffffffffe, 0x0, 0x5, 0x7, 0x5}}, {0x10, 0x2, [0x0, 0x6, 0x0, 0x22a47dd0, 0x7fffffff]}}, {{0x1c, 0x1, {0x1d2, 0x5, 0x7fff, 0x4, 0x2, 0x9, 0x8, 0x1}}, {0x8, 0x2, [0x0]}}, {{0x1c, 0x1, {0x102000000000000, 0x40, 0xa7, 0x9, 0x0, 0x9, 0x161, 0x1}}, {0x8, 0x2, [0xfffffffffffffffb]}}, {{0x1c, 0x1, {0x153b1a07, 0xff, 0x1, 0x8, 0x0, 0x9, 0x2, 0x4}}, {0xc, 0x2, [0x1, 0x1, 0x452f, 0xf6]}}, {{0x1c, 0x1, {0x4, 0x400, 0x33f, 0x3, 0x1, 0x1, 0xfffffffffffffffc, 0x8}}, {0x14, 0x2, [0xffffffffffffffff, 0x531c, 0x1, 0x50957a05, 0x7fffffff, 0x3, 0x8000, 0x5a8000000]}}, {{0x1c, 0x1, {0x2, 0x100, 0x7, 0x5, 0x2, 0x0, 0x3, 0x2}}, {0x8, 0x2, [0xff, 0x7ff]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x4}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x16e6}, @TCA_STAB={0x154, 0x8, [{{0x1c, 0x1, {0x6, 0x0, 0x1, 0xff, 0x2, 0x8001, 0xa904, 0x3}}, {0xc, 0x2, [0x80, 0x0, 0x9]}}, {{0x1c, 0x1, {0x1f, 0x7fffffff, 0x1f, 0x2, 0x3, 0x0, 0x200, 0x1}}, {0x8, 0x2, [0x4]}}, {{0x1c, 0x1, {0x6, 0xffc000000000000, 0x800, 0x0, 0x1, 0x1, 0x0, 0x6}}, {0x10, 0x2, [0x7, 0xfff, 0x7fffffff, 0x576, 0x7, 0x400]}}, {{0x1c, 0x1, {0x3f, 0x5, 0x3f, 0x7ff, 0x2, 0x4, 0x67, 0x2}}, {0x8, 0x2, [0x4, 0x7]}}, {{0x1c, 0x1, {0x6, 0x3ff, 0x4, 0xfffffffffffffffe, 0x1, 0x2, 0x81, 0x9}}, {0x18, 0x2, [0x1, 0x7, 0x1f, 0x2, 0x4, 0x0, 0xfffffffffffffffa, 0x287, 0x9]}}, {{0x1c, 0x1, {0x8, 0x3, 0x3f, 0x7, 0x1, 0x400, 0x4, 0x6}}, {0x10, 0x2, [0x3f, 0x3f, 0xdf, 0x10000, 0x9, 0xfd3f]}}, {{0x1c, 0x1, {0xbeb, 0x6, 0x0, 0x1, 0x1, 0x7, 0x8, 0x4}}, {0xc, 0x2, [0x10001, 0x8, 0x6, 0x8]}}, {{0x1c, 0x1, {0x9, 0x1ff, 0x8001, 0x0, 0x2, 0x1, 0x8, 0x5}}, {0x10, 0x2, [0x3, 0x7, 0x1, 0x7, 0x0]}}]}, @TCA_RATE={0x8, 0x5, {0x1, 0x9}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x4}]}, 0x4ac}}, 0x4048010) tkill(r1, 0x22) clock_gettime(0x0, &(0x7f0000000900)={0x0, 0x0}) nanosleep(&(0x7f00000000c0)={r4, r5+10000000}, 0x0) signalfd4(r0, &(0x7f0000000040)={0x6}, 0x8, 0x0) 03:42:04 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="39000000130009006900000000000000ab00804802000000c60001070000001419001300010000000100000045f26d8c1c0afc7193bf960000", 0x8e}], 0x1) r2 = gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:04 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x440641, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0xca, 0x2, 0x7, "a2408d11ee4d4f00e236b882b54b2128", "4b94eb69384dd32f07e499af999504b20985e197e36468fe30178a5dbc8e3d57dd13baaa43eea4791462909847beb1091ac761f0448ca0d1f780402aa5668752b3b6cf4a50f6c8b832b30e6d25f1e8ef634a69f61716fbe75af349b88ce4035849ceab683b236d38c6ff0c97aeda1e033b29f2a4d28ee8efac0ce58f88cf83cc724ee3486e198760a37f307b0af90ee29d316f2e8ff757b5c865dda6f43fd4003d91c8f44e95c4e5ec91abc0f20181d8f087a6a9e8"}, 0xca, 0x1) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) socketpair(0x3, 0x3, 0x80000001, &(0x7f0000000080)) [ 1221.560815] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.573681] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.573775] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.602179] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:04 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setregs(0xd, r1, 0x1, &(0x7f0000000100)="d00b8b747c321ede50f50766f5f8043748c484f3ff962d01f601e2e0dd33de586aca291c7c72e1b7d294908f8e3f4bb86a8eba69b37c0d503a0149c1415eba5b2ac7f26aff7878463ac1752cbfcf6a30a6f87ab8a8dde1050a9f61bf19f4b94170a548c0a148cc0df1c3be1699a277e766a34b653fa1b8264fab59bc2dde6e713b531116cf8b5b61176444bb42dd8929d533a95a93cd807efd2cf5f8d326c00bd0e81c892790ffc70d70fdf397") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:04 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x301, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) [ 1221.606521] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.660813] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.690835] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.759655] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.769320] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:04 executing program 3: pipe(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x2, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') r2 = dup3(r0, r1, 0x80000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1081000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd4, r3, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x63e}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x10001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6382}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x48000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000480)="dd31000b168eeeedd6ec8edc050babfd21d1ed1d46d4728ed1c3966938a519aba207fb9c5d25f190292a0f1ff8841a0cfade181b30b134843236e5608a68b54df3844fe7f1667d4c801d55ddf43fd768bc1b413955e19fe27b3c878c0db489f1cf990e65d24b05344dc421b967b2f2d1948520b7194f14d9ac4e687e9cbc50664eeb016385181696fb211ac8c72a3c8c0165d0f176c9d0e5cf3558c6d5b5021162a5e7ece53530a1436e4e105eb74417") 03:42:04 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() accept(r0, 0x0, &(0x7f0000000040)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1221.784207] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.860593] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1221.993331] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1222.019799] audit: type=1400 audit(2000000524.653:94): avc: denied { create } for pid=23515 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1222.037208] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1222.053029] audit: type=1400 audit(2000000524.683:95): avc: denied { write } for pid=23515 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1222.100171] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1222.111409] audit: type=1400 audit(2000000524.743:96): avc: denied { read } for pid=23515 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1222.142114] audit: type=1400 audit(2000000524.773:97): avc: denied { create } for pid=23515 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1222.156473] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1222.174366] audit: type=1400 audit(2000000524.803:98): avc: denied { write } for pid=23515 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1222.212167] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1222.221525] audit: type=1400 audit(2000000524.853:99): avc: denied { read } for pid=23515 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:06 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = accept4$inet(r0, 0x0, 0x0, 0x80000) write(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x0) clone(0x800, &(0x7f0000000100)="83fd5db92318565530dc7936e8127f07fe761906a2abce739e1c044462fe10629babcfabf7b6cefef32465a9b908d5a4853c3997f19b74d8f1bd9e938d64a90433b7a573d22240834eee60643a32d9af23fa20b2a76b2abbcd3b187857f6fb8ddfb9012c91d742c7cb5516a981ce337af005bcdfb9f2ff7f14911177bc5d907daa68e793a2b4507fd06b6ba6b045d1ca21390f2081ce0082b09fbfc1e0ff81e0e2f9bf09604d8492da044027ad5d48fb29c931a622a6b2045344766ff9f554ff99e1821c7e7410a396cacc7f82", &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="93b6b4bea215e83165be956c617258b36af8feb6061ffe60eeca748130b0ae203c127f84ae18d48e8431d154b77129ec10b5e72c44b40e7ff54ed96649c91054b8a11cf8fc9c97999fb2c0ce25d15eba21ac4ad22d8f89fd5d5d158cc257dd303446145c16da307e5ac5cfc9f10647fe1aeb3ae6e521da6050968b99bfbbd9e78d57c66c69bef5985cc914b28b7169d2b64dd5f1502cb2212585a2ea7780556653120dc90a291522a9b3c5d89f5421ba0b3697c31b0213ba6d22c34251688f94fccd29378299288565e7e04938005b23acc2741ef4576e23831b1b01ed9e8384d144d8") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = fcntl$getown(r0, 0x9) fcntl$lock(r2, 0x6, &(0x7f0000000280)={0x5807939c20abb771, 0x4, 0xaec, 0x0, r3}) fcntl$setpipe(r1, 0x407, 0x1) r4 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x22) wait4(r4, &(0x7f0000000040), 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000005c0)={{0x2, 0x4e23, @broadcast}, {0x1}, 0x0, {0x2, 0x4e24, @multicast1}, 'lapb0\x00'}) write$selinux_context(r2, &(0x7f0000000000)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c400000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:06 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0xfe) getdents64(r0, &(0x7f0000000080)=""/239, 0xef) 03:42:06 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='bpf\x00', 0x82040, &(0x7f00000001c0)='cgroup2\x00') read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000400)='cgroup2\x00', 0x10, &(0x7f0000000100)='\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:06 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, 0x0, 0x7fffe) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:06 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:06 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:06 executing program 3: pipe(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x20201, 0x0) r4 = fcntl$dupfd(r3, 0x1, r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000740)="36421618e90be7d86f40a5244d941d8ec7f4aa9eec3e1dc7cf054868073971045099fbe5526c13b5f2a89bee2cfb1d33a31709e16df74bdea5ccabeda72010cd165f4eae8f02459e919cb9", 0x4b}], 0x1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000200)=0x7ff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="210829bd7000fbdbdf25010000003400070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) ioctl$RTC_IRQP_READ(r5, 0x8008700b, &(0x7f00000008c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000007c0)) [ 1223.853441] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1223.879767] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1223.936023] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1224.046463] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1224.074841] audit: type=1400 audit(2000000526.703:100): avc: denied { create } for pid=23553 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1224.075408] audit: type=1400 audit(2000000526.703:101): avc: denied { write } for pid=23553 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1224.145761] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1224.156343] audit: type=1400 audit(2000000526.783:102): avc: denied { read } for pid=23553 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:06 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@remote}, &(0x7f0000000100)=0x14) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:06 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x1) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1224.183570] audit: type=1400 audit(2000000526.813:103): avc: denied { create } for pid=23553 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1224.271673] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:07 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x8, 0x4, 0xfffffffffffff385, 0x7efe, 0x5, 0x5, 0x2, 0x2296, 0x6, 0x40, 0xf514, 0x80000001}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:07 executing program 5: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) write$P9_RGETLOCK(r0, &(0x7f0000000180)={0x26, 0x37, 0x2, {0x1, 0x2, 0x400, r1, 0x8, 'cgroup2\x00'}}, 0x26) r2 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1224.375118] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1224.400561] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1224.406018] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:07 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, 0x0, 0x7fffe) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1224.448438] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1224.482229] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1224.593780] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1224.636362] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c400000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:09 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0xd800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:09 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x108) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) 03:42:09 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:09 executing program 2: r0 = timerfd_create(0x2, 0x0) write(r0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr(&(0x7f0000000080)='.\x00', &(0x7f0000000100)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000180)='&\x00', 0x2, 0x1) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:09 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x556) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000001c0)={@empty, @dev}, &(0x7f0000000100)=0x8) r1 = gettid() fcntl$getown(r0, 0x9) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x6}, 0x8) ptrace$setopts(0x4200, r1, 0x3, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:09 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x4, @multicast1, 0x4e23, 0x2, 'rr\x00', 0x0, 0x4, 0x62}, 0x2c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)='cgroup2\x00', 0x800035, &(0x7f0000000180)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8001) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x7530}}) [ 1226.984083] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.117713] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:09 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000040)={0x7, 0x24000000000000}) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1227.165014] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.297543] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.308097] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:10 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$cont(0x1f, r0, 0x6, 0xffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:10 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000540)) fcntl$getown(r0, 0x9) r1 = gettid() ioctl$sock_netdev_private(r0, 0x89f0, &(0x7f0000000100)="53ce10860b1cacfd2a89a9d0ce9c158be76fd41c1f615c6493b99d9cdad2e68c8b6e19cc0bd25bf799aced13b550c383") mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:10 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='numa_maps\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x561aed16f03cbec5}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x101, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x100000001}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 03:42:10 executing program 3: pipe(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000000)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x60) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1227.364904] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.394748] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.410695] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.418776] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.499495] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.523871] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1227.543823] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c400000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:12 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='efivarfs\x00', 0x10, &(0x7f0000000480)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3?7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe\"\xe4 \xd0p\x86\xb5\x9bk\xc1\x9c\xb9\xa6\xdc\xa5%\xd9\x8c\xdc\xc9\x1b\xb2i\xb2\xbb\xe3\xde\xd8X\'\b\xcc\x96lZ\xb5\xc0\xf3\xd9KG\x81\xc5\x9d\xd3\xac\xaa\x16\xe3>3\x81\xa7\x94\xca\xce\xd5[\x8aD!\x99\xbb\a\x99d\xaf\xcc \x92\xff\xd7\xc8\x9d&\xd8b\x0e\xfcG\xffw\xa7$i!\xb2\xc8\x01\xc3\xce\xc2\xcf\'T\xb5\xdc\x83\x81g\x8b\x12S,$.o1+\xb4 \x8f\x0f\xe5\xb7\xebl\xbb\xea\xd9\x01\xe5\xc2\xff\x91\x8c\xbb\x1f\x15\xdd\xa9\xe8\xdaP\xb1\x81\x93\x18\x81\x02\xed\xab\xbd\xfaA\x14bP\xd3X\xeb\xf8\xb4\xcd\xa2\xb0\x83\xcd*\x1c\xde\x15Rg\x84r\x80\xe3k\x86\xf6.\xc5\x92ur\xf4\xeaC\xee\xf5\xe2\xcb\x06\x1d#\xebv\xd2\xb0\xcd\x1c(o\x01\xeaDG\x14k+a\xe2\x97\xbeE\xac\x15.N\x99\xea\xe4\xdd\xeec\x19\x1c\x19\xae\x12s\xed\xa1bv\x82\xecN\xb25q\xb9[G\xfboR\xe6\xc3(w\xaf\x8dLZ\x9b\xdbO\xf1\xb5\xcc\xd6\xe6]\x13\xa9vA\x10M\x81\xba\x9b\x10js\xac\x02\xa8\x90\xbeB\x112d6\x8e`\n\x0f\x7f\xcd\xc6\xf1\x85\xd80L9X\xe0\xc3\x1b\x9eu\xcd(?U\x83\xa3N\x87\xecd\x96\x88\xeaD$6\xae<\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00}\xebc\x0f') r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x111300, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x84800) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0, 0x100}, {r1, 0x4}, {r2, 0x20}, {r3, 0x12}], 0x4, 0xf91d) 03:42:12 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x7d, 0x9859, 0x8, 0xf14, 0x0, 0x80000000, 0x80000, 0x8, 0x9, 0x8000, 0xfff, 0xffffffff, 0x3, 0xffffffffffffffff, 0xfffffffffffffffa, 0xffffffffffffffc1, 0x8001, 0x0, 0x6, 0x7, 0xfffffffffffffff7, 0x5, 0xffffffff00000001, 0x100000000, 0x0, 0x8, 0x0, 0x9, 0x9, 0xfffffffffffffffa, 0x3, 0x1, 0x81, 0x8, 0x400, 0x5, 0x0, 0xecad, 0x4, @perf_config_ext={0xffffffffffff8001, 0x8}, 0x40, 0x2, 0x5, 0x5, 0x2, 0x100, 0x7}, r0, 0xb, 0xffffffffffffffff, 0x1) 03:42:12 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:12 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) [ 1230.030761] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.115069] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:12 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = request_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000480)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe', 0xfffffffffffffffc) r1 = request_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000005c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe', 0xfffffffffffffff8) r2 = request_key(&(0x7f0000000700)='user\x00', &(0x7f0000000740)={'syz', 0x0}, &(0x7f0000000780)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe', 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000008c0)={r0, r1, r2}, &(0x7f0000000900)=""/190, 0xbe, &(0x7f0000000a00)={&(0x7f00000009c0)={'streebog512-generic\x00'}}) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:12 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1230.316539] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:13 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8900) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000100)={0x5, 0x9, 0x2, 0x7fff, 0x4}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:13 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1230.361606] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.387303] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.507388] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.527893] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.547776] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:13 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:13 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, 0x0, 0xfffffffffffffdc4) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpid() r2 = gettid() perf_event_open(0x0, r2, 0x40002, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$getenv(0x4201, r1, 0xfffffffffffffffd, &(0x7f0000000580)) timer_create(0x0, &(0x7f0000000040)={0x0, 0xa, 0x2, @thr={&(0x7f0000000100)="d96556f754dc04ad5b6bfa1bbebe83687b521a00170e63865a000dcb1411a13e739d6d2062f1a7d2ac8ab7a9e2c0f664f89d86259f6da115caa038ef628f9bd5f3d3769eeb5775a254572725fd8bfbd9455b931d4c1e2eb535cf404538392e30f64bd5bb3fe51c17ce1ba56657e322256ece1cba2655a54eb34cd570141e9e96ef7f37010149a92c058b415b7d2d352464c82e8e3063c1c9f8ac93536b38d04c5c77ea1b2579e75133c1a68021560d56216363b1219e2b333252f0ac3f2d", &(0x7f00000001c0)="168c36617bd9d4d7bdf6efe1d527d013cf9df1115133588bddf6f4222cc77cd65ac2f7bcaaabe8ac2d5d677d72f43b7ec89f5fab44e84492d127d43a204d6d76a3a42da1a87e9fe2be30d32747b9428d65c1b70eb820bfef38f424f1f167ddfc48d399fe44035b5980c1189bfd2e2a66039c342ed2ef9a69c459173c9005d942904b7047b428337ae04c06b5bac6b2557e4b5e949198d73eb6baf57f0bfbe2de959c4a65da8cafe167ef13fc12a68b6fcdc2f7b6d428f6241f869e19363c75b672742c86254f0e979c63f04e4df5f61ea408a56d00933e5dfcab33deb4df0a3df3f574ba17d6d184c6970245872bd728a2"}}, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) timer_settime(r4, 0x1, &(0x7f00000004c0)={{r5, r6+10000000}}, &(0x7f0000000500)) ptrace$setopts(0x4206, r3, 0x0, 0x0) dup2(r0, r0) prctl$PR_GET_TSC(0x19, &(0x7f0000000540)) tkill(r3, 0x22) tgkill(r3, r3, 0x10) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1230.565314] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.575208] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.594541] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:13 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20000, 0x0) r3 = accept(r0, &(0x7f0000000240)=@caif, &(0x7f0000000480)=0x80) sendmsg$nl_generic(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xc8, 0x17, 0x800, 0x70bd29, 0x25dfdbfb, {0x11}, [@generic="d0114192e8cd0ca1c50ccf3c74b82222fe5df21d23f6503699a9442ddeb4ac79386d5d87b54e83acfd8ebd4676c24520e4237b6d6e203d6ce9e0e745ceb621870e52e06e6d3c4c937afa6ba312c9e61f250bafb4e37e33fc57550540570e3948202a384826", @generic="d934e4f385b04efd79932b9997881599d36656132f5e70df052a4ca3a9920e0c40a8d7543833f63e80e4b6898f1083695ce60b00ba5158769d18696247a15eef732ad3f666b13eab6a7882f113c9"]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r4, 0x8f18508e0fc41e5c, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xffff, @link='broadcast-link\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4004014}, 0x4004) [ 1230.644735] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.768111] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.811479] audit_printk_skb: 6 callbacks suppressed [ 1230.811489] audit: type=1400 audit(2000000533.443:106): avc: denied { create } for pid=23726 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1230.825316] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1230.853129] audit: type=1400 audit(2000000533.483:107): avc: denied { write } for pid=23726 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1230.904051] audit: type=1400 audit(2000000533.533:108): avc: denied { read } for pid=23726 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1230.933156] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1231.130382] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c400000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:15 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x7fffe) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:15 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) r3 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xc) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:15 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x0, &(0x7f00000000c0)={{r0, r1/1000+30000}, {r2, r3/1000+10000}}, &(0x7f0000000100)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:15 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) readlinkat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/110, 0x6e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:15 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f0000000080)) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') socket$inet6(0xa, 0x80003, 0xff) syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1233.132742] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1233.143436] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:15 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000080)=@ethernet={0x0, @dev}, &(0x7f0000000100)=0x80) [ 1233.175302] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1233.292989] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1233.307168] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1233.339524] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:16 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000780)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10080020}, 0xc, &(0x7f0000000740)={&(0x7f00000004c0)={0x270, r3, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc4c}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe366}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa07}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x10c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffff76ff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5d100000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1ff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x191}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @mcast1, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x270}, 0x1, 0x0, 0x0, 0x1}, 0x40080) ptrace$setopts(0x4200, r1, 0x4032, 0x100010) r4 = dup3(r0, r0, 0x80000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r4}, 0x10) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:16 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10200004}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8010}, 0x40040) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1233.447630] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:16 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x210000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000480)={0xa0, 0x0, 0x5, {{0x6, 0x3, 0x2a43, 0x6, 0x6, 0xffffffff, {0x6, 0x3, 0x4b62b961, 0x5, 0xb8ff, 0x2, 0x15c6e48f, 0x1000, 0x2716, 0x5a01, 0x0, r1, r2, 0x3, 0x8}}, {0x0, 0x8}}}, 0xa0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f0000000580)={'L-', 0x6}, 0x28, 0x3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:16 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:16 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x8, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1233.535270] audit: type=1400 audit(2000000536.163:109): avc: denied { create } for pid=23766 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1233.582300] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1233.671530] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1233.711870] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1233.777867] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1234.005887] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c400000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:18 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, 0x0, 0x1c) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='f2fs\x00', 0x44000, &(0x7f0000000240)='^]($^\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, &(0x7f0000000100)="2e232a2633eeeca614", 0xa9, 0x20000000, &(0x7f0000000140)={0x2, 0x4e22, @rand_addr=0x200}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) clock_gettime(0x0, &(0x7f0000000280)) nanosleep(&(0x7f00000001c0), 0x0) gettid() 03:42:18 executing program 3: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) fcntl$setsig(r0, 0xa, 0x3a) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000000c0)={0x7, {{0xa, 0x4e21, 0xf4f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100000000}}}, 0x88) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000180)={r0, 0x0, 0x8, 0x8, 0x4}) sendmsg$nl_netfilter(r3, &(0x7f0000498000)={0x0, 0x0, &(0x7f00008b7ff0)={&(0x7f0000000540)=ANY=[@ANYBLOB="2400000001010100000000003f2c11b91e6143481000020004000100080002000000e100"], 0x24}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigtimedwait(&(0x7f0000000200), 0x0, 0x0, 0x8) pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') exit(0xf1d1) 03:42:18 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) write$P9_RGETLOCK(r0, &(0x7f0000000180)={0x2a, 0x37, 0x2, {0x2, 0x401, 0x3, r1, 0xc, 'mime_typeem0'}}, 0x2a) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:18 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x7fffe) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:18 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = getpgrp(0xffffffffffffffff) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:18 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r2 = accept(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x0, @broadcast}, &(0x7f0000000080)=0x80) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100)={0x69}, 0xfd) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x32, 0x20, 0x1ff, 0x7, 0x0, 0x0, 0x2, 0xc, 0x5, 0x401, 0x7f, 0x12, 0x2002, 0x4, 0x4, 0x40, 0xfffffffffffffe01, 0x6, 0x0, 0x100000001, 0x6, 0x67, 0x0, 0x1, 0x2008f089, 0x9, 0x3, 0x0, 0xd26d, 0x8, 0x7, 0x2, 0x6, 0x0, 0x62, 0xd1, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000600)}, 0x140, 0x0, 0xf78, 0x1, 0x7fffffff, 0x2}, r1, 0x8, r0, 0x2) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x2100, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f00000004c0)="72e0d0e4643d8f3ed8646b445cd7ca96bdbd8ec81a3aff242907628d9ea7d1f6bac26e7b8704bfdace5f4c908a0794cdb2581f4d9e3f962b498de1afbed39cb45a227ad485f07c35f4dd5a1d87a64285dccd97b44ec871fe3e97dfb1bc448a1b2b084aaf10baf6b6f8372f59a72b2beb9be8e82d3cda0d79d2f1575fdaabbedd") [ 1236.172262] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.205230] audit: type=1400 audit(2000000538.833:110): avc: denied { create } for pid=23794 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1236.248274] audit: type=1400 audit(2000000538.873:111): avc: denied { write } for pid=23794 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1236.274602] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:42:18 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x5, &(0x7f0000000080)=[{0x1, 0xd8c, 0x0, 0x100000001}, {0x4, 0xe2, 0xffffffffffffff74, 0x33449664}, {0x2, 0x100000001, 0x6, 0x1ff}, {0x0, 0x7f, 0x6, 0x423c}, {0x1, 0xffffffffffffff00, 0x3, 0x4000000000008000}]}, 0x10) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1236.351313] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.351447] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.402047] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.468557] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.504656] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:19 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x400000) read(r0, &(0x7f0000000480)=""/205, 0xcd) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000600)) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) r4 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x22) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000180)={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x6, @dev={[], 0x18}}, 0x4, {0x2, 0x4e21, @local}, 'nlmon0\x00'}) fadvise64(r1, 0x0, 0x4, 0x4) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) exit(0x7) [ 1236.546861] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.551370] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:19 executing program 2: r0 = dup(0xffffffffffffffff) r1 = inotify_init() write(r1, 0x0, 0x169) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x140000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)={0x164, r3, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}]}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x506}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x4}, 0x81) r4 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x22) read(r2, &(0x7f0000000480)=""/194, 0xc2) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:19 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x7fffe) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1236.594129] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.642700] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:19 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x6, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000100)=0x6) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) nanosleep(&(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) [ 1236.728976] audit: type=1400 audit(2000000539.353:112): avc: denied { create } for pid=23838 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1236.840358] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.915840] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1236.992360] audit: type=1400 audit(2000000539.623:113): avc: denied { create } for pid=23794 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1236.999097] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c400000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:21 executing program 3: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]) setresgid(r0, r1, r2) pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:21 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) socketpair(0x9, 0x80000, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000780)=0x0) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='net/arp\x00') ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000100)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ptrace$setopts(0x4200, r2, 0x21, 0x100000) tkill(r4, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000700)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000004c0)={0x1d0, r5, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x11c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa10a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2cc0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9095}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x745c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 03:42:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = open(&(0x7f0000000240)='./file0\x00', 0x400000, 0x10) write$P9_RLERRORu(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="2c0000000702001f002f70726f632f7468726561642d73656c662f617474722f63757272656e9300f9ffffff"], 0x2c) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)="0829a8963a7de09c403c9c7e5d15d7d78885accaa17fefecc33081ea45318aa8cdbbc09118b2a9689620af97f0ea11348d3fbcdd9c4719308d9733b0a5778f9a30447579b27964e74c648023417a16354abb5f60fb8ae1570d5ffcebfdf3c21f", 0x60, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000180)='vmnet1({$self\x91ppp0.', &(0x7f00000001c0)) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:21 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1239.260542] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.271227] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:21 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000140)=0xffffffffffffffff, 0xfffffc46) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000080)=r1) 03:42:21 executing program 3: pipe(0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000180)={0x3ff, 0x8}) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x1, &(0x7f0000000040)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:21 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x20002, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000480)=""/255) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) fchmod(r0, 0xd1) 03:42:22 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000480)=""/4096, &(0x7f00000000c0)=0x1000) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101080, 0x70) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x2, 0x1500) 03:42:22 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000100)=""/141) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1239.435403] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.448018] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x1, 0x100, 0x7, 0x6}]}) r0 = eventfd2(0x8004000000004005, 0x80000) write(r0, 0x0, 0xfffffffffffffdc0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) epoll_wait(r1, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x80) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x800, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x321) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1239.464741] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.508303] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:22 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KDSKBLED(r1, 0x4b65, 0x15) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1239.568880] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.588208] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.605801] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.652546] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.704793] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.705280] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.748612] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.780344] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1239.789842] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:24 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') socket$inet_udplite(0x2, 0x2, 0x88) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c40000000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:24 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:24 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xffffffffffffff01, 0x4, 0x9, 0x1, 0x0, 0x7, 0x4000, 0x1, 0x9, 0x1, 0x1, 0x0, 0x40, 0x1, 0x2, 0xff, 0x8, 0x4, 0x5, 0xfff, 0x5, 0xb6ae, 0x3, 0x5, 0x8001, 0xfff, 0xfff, 0xfff, 0x4, 0x800, 0x9, 0x2, 0x0, 0xbb9, 0x2c25, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x4, 0x2, 0x8, 0x1, 0x0, 0x8}, 0x0, 0xb, r0, 0xb) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x200400, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:24 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) accept(r0, 0x0, &(0x7f0000000040)) 03:42:24 executing program 3: pipe(0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680)={0x0, @rand_addr, @remote}, &(0x7f00000016c0)=0xc) sendmsg$inet6(r0, &(0x7f0000001900)={&(0x7f0000000100)={0xa, 0x4e22, 0x8, @mcast2, 0x4}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000000140)="39bdc5f8f13bf7fb600bac4ac6c0acc09ea47fda1d20325353ea14ad9c23427601702f0fd27b373d9eb7d2978e7dbcbac727cea55b8c0b7276fdeb24a1b8416fe5253670bd8cbf02141ca388e7a90245509e186496600472c8ee7d1f7c32845e0d4b20001824b55eae1e27e4c8b267ce3135d07fb0717aff0eb22781c10dea4fa644a1df2820c883c534551253", 0x8d}, {&(0x7f0000000200)="def41321a576e54e0ba8db8d4f8fb8f9913a52b065b7e6a598025209c7edc23b654d1ef1a7f976a9b9077b32c6df2b3ab6001eb6ea2066643bf7802b62a91532451479d8c1ad663ffec59c65975cba84a49a06327ac86730d96a9f5c9ed1df94855605b4ce5bd3ada937625a57e6ba1e42605a84b17373db4d01df4e3d56f59044abf3b6d8be3774f50b37671c01bf1708906d0296398b", 0x97}, {&(0x7f0000000480)="6c0a5ff270bb0e61c08914bbd14d117b36ccae583473ef", 0x17}, {&(0x7f00000004c0)="ef5c839707513f9c22c191328e123ec580bfa0d40e769523819d0fad9f05b5ab33dfd31de4102f0accfe63711c3823683dee5b2bcd7b5eb31e66150e3d9004b3a172a51d57371358b7ffa561e6052164", 0x50}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="bab0ffdb0974c54b1d064e31f1aa3ca3904a4104e3e44f7b54a1b941a918fe7339e78062dd369ee5ae27c9014df72b21aaa6ad221385cb6888a4a34ab92b146ad8bef4dfcc4d3a83b6f45bb1f79a9806096e434af06018a225f1583f60aef3f3700fc00285b3111532fd99e8e578fe7cec5d11388dbff219bb3c5c594a9e5c0721dd7fa5588dbe53df9bcb570387ae6b83ad1edbaeacadb9d597e85e8385b08b120869a96b43551cf481abd8fc991b77f6bff7163eb3c0ed14c452363bc2", 0xbe}], 0x6, &(0x7f0000001700)=[@dstopts={{0x88, 0x29, 0x37, {0x1d, 0xd, [], [@enc_lim={0x4, 0x1, 0x7}, @calipso={0x7, 0x10, {0x1, 0x2, 0x7fff, 0x1, [0x6]}}, @generic={0x8001, 0x3a, "4c4d774d997687f61aa126c1ce68685b3f6971a0c303e94e8a6d4963918cbcabd40a28b615ff48448297cd855faabd563943f46d6f894375f58d"}, @hao={0xc9, 0x10, @rand_addr="0c15e8f77b991d70703ad19885992f85"}, @pad1, @ra={0x5, 0x2, 0x5}]}}}, @dstopts={{0xf8, 0x29, 0x37, {0x2b, 0x1b, [], [@calipso={0x7, 0x30, {0x7, 0xa, 0x5, 0x1, [0x9, 0x0, 0x3ff, 0x80, 0x5]}}, @enc_lim={0x4, 0x1, 0x6c5b}, @generic={0x2, 0xa5, "92dd20ea70b8e38129c70a740cbfe1de582f229e51b729d1d70ad0bd71f19c032cce92b8fda76b66fe837c65faef2d511f198f2d3bbed36e6bff1399e07cd611626af30b0f5662ed7679727360edcb2c60477fa79c6ea8a6e01f65e2787074387ac8f32512bc64268232540126f5a214ef3fce71cec42c198b517523427da43b0523b2da23281416a91212323e2b6bda500874de757c1649963c04fb02bdec11f6f800fa5a"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @rand_addr=0x10000}, r1}}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x2b, 0x5, [], [@hao={0xc9, 0x10, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, @ra={0x5, 0x2, 0x20}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x8}, @enc_lim={0x4, 0x1, 0x1f}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x1f0}, 0x81) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:24 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') accept(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000080)=0x80) ptrace$setopts(0x4206, r1, 0x0, 0x0) accept(r2, &(0x7f0000000480)=@caif=@rfm, &(0x7f0000000500)=0x80) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1242.328887] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.341318] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.353007] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:25 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) 03:42:25 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz1\x00', {0x8000, 0x8e, 0xff, 0x6}, 0x25, [0x3ff, 0x1, 0x100000001, 0x5, 0x5, 0x3, 0x3, 0xdb, 0x9, 0x2, 0x401, 0x7, 0x80000000, 0x55, 0x0, 0x4, 0x9, 0x3, 0x40, 0x9, 0x34, 0x9, 0xc6, 0x0, 0x1, 0xff, 0x3ff, 0x5, 0xac7, 0x101, 0x7, 0x6, 0x2, 0x0, 0x2b, 0x80000000, 0x9, 0x8001, 0x9, 0x5, 0x1, 0x7, 0x4, 0x7, 0x7ff, 0x3, 0x7, 0xfffffffffffffff9, 0x0, 0x0, 0x7, 0x5, 0x80, 0x40, 0x1, 0x9, 0x79, 0x800, 0x7, 0x0, 0x2, 0x200, 0x5, 0x6], [0x81, 0x1000, 0x6, 0x1000000010000, 0x8b, 0x200, 0x1, 0x4, 0x6a, 0x9, 0x97, 0x4, 0x96d74f8, 0x12c, 0x3ff, 0x9, 0x0, 0x41, 0xfffffffffffff800, 0x5, 0x1, 0x2, 0x6, 0x7f, 0x80000001, 0x8, 0xfffffffffffffffa, 0x3ff, 0x4, 0x6752, 0x8, 0xd871, 0xdb, 0x1, 0x9, 0x7, 0x7ff, 0x7, 0x4, 0x20, 0x10000, 0x9, 0xff, 0x4c0, 0x7fff, 0x8c, 0x6e, 0x2, 0x8, 0xfffffffffffffffa, 0x0, 0x6, 0x0, 0x9, 0xf476, 0x4, 0xffffffff, 0x7, 0x7ba, 0xffffffffffffffff, 0xffff, 0x0, 0x5, 0x7], [0x3f, 0x7fff, 0x2, 0x200, 0x4, 0x81, 0x1, 0x20, 0x7, 0x7, 0x1, 0x3, 0x48, 0x5, 0x7fff, 0x62, 0x20, 0x6, 0x7fff, 0xfffffffffffffe01, 0x2, 0x59, 0x2, 0x3, 0xa51, 0x4, 0x2, 0x3, 0xbf2, 0x2, 0x0, 0x100000000, 0x800, 0x1, 0x80000000, 0x6861baac, 0x7, 0x800, 0x2, 0x4, 0x7fffffff, 0x3, 0x101, 0x401, 0x1000, 0x0, 0x31, 0x1, 0x1, 0x0, 0xa3c, 0x8000000000000000, 0xff, 0x80000001, 0x5c, 0x2, 0x4, 0x1f, 0x1, 0x7fffffff, 0x3, 0x4, 0x1f, 0x10000], [0x0, 0x9, 0x100000001, 0x0, 0x7, 0x1, 0x3, 0xfff, 0x2da, 0x7fff, 0x5, 0x8, 0x9, 0x100000000, 0x5, 0xfbc, 0x8000, 0xa429, 0x40, 0x2, 0x9e6, 0x3f, 0x46b9, 0x7, 0x3ff, 0x0, 0xffff, 0x6, 0x0, 0x3, 0x3f, 0x6, 0xffffffff, 0x9, 0x0, 0x3, 0x5, 0xf170, 0x3, 0x200, 0x7d6322aa, 0x7f, 0x6, 0x3ff, 0xffffffffffff42c7, 0x4, 0x0, 0x6, 0x6, 0x5f, 0x9, 0xaf7, 0x1ce, 0x3, 0x814, 0x0, 0x5, 0xffffffff, 0x20, 0xbf, 0x0, 0x3, 0x7]}, 0x45c) r1 = inotify_init1(0x80800) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x8, r2}) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) fcntl$setpipe(r1, 0x407, 0x100000000) [ 1242.393238] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:25 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r2 = dup2(r0, r0) write$FUSE_STATFS(r2, &(0x7f0000000180)={0x60, 0x0, 0x4, {{0x2, 0x4, 0x9, 0x0, 0x3, 0x8, 0x80000001, 0x8}}}, 0x60) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1242.489984] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.526646] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:25 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) setsockopt(r0, 0x80, 0x1ff, &(0x7f0000000200)="366ebba475965170ea1bef16f701b76c7db276ea3f1dfcbcf463c75695cbc27673ec6e8ced56b463a68d4e6906a41d300085927cfc769754970641df9dd9348e72c5705f28db9cb6d2e1f1e7fa8bbe50a0f8f044e1a93845b44868c64d5fb2b36dba43", 0xffffffffffffff92) tkill(r1, 0x22) ptrace$setopts(0xffffffffffffffff, r1, 0x5, 0xdd4e9a91d90433f5) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000001c0)={0x1, 0x3, 0xc3, 0x385, 0xc, 0x101, 0x80000001, 0x8, 0x4, 0xffffffff, 0x4, 0x1}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000000080)="01008736347764884546b81921e6b89204a873fbfe1819a0299956d27f9175", &(0x7f0000000480)=""/4096}, 0x18) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1242.586792] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.607433] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.632660] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:25 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0xa11, 0x9, 0x100000001}) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x6f83de28d321e5a5, 0x10) write$selinux_validatetrans(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a73656d616e6167655f73746f72655f743a73302073797374656d5f753a6f626a6563745f723a74756e5f7461705f6465766963655f743a733020313834343637343430373337303935353131303518756e636f6e66696e656400"], 0x6c) 03:42:25 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x841789a34191b908, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') accept4$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14, 0x80000) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf435b09dc1b18e6c}, 0x1) [ 1242.657419] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.725772] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.768017] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.769730] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.782645] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.806819] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1242.818643] audit: type=1400 audit(2000000545.443:114): avc: denied { create } for pid=23961 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1242.819164] audit: type=1400 audit(2000000545.443:115): avc: denied { write } for pid=23961 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1242.893281] audit: type=1400 audit(2000000545.523:116): avc: denied { read } for pid=23961 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1242.927574] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1243.027466] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:28 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0x0, 0x802) write(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x8000, 0x0) read(r1, &(0x7f0000000580)=""/250, 0xfffffffffffffec6) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x80) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RFSYNC(r1, &(0x7f00000004c0)={0x7, 0x33, 0x1}, 0x7) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000280)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x20) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) wait4(r2, &(0x7f0000000040), 0x8, &(0x7f00000001c0)) 03:42:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c40000000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:28 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:28 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, 0x0, 0xff38) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000001c0)={@loopback, 0x0}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000680)=0xe8) sendmsg$inet(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="e6a7e5f1135c05ef8185c51148a73aaae77e6c501fed9cf84339b695b6a40f2ff2c9f8568492c7a39bf85de4ead2a81df1f3a4471a72926b772fc251a58c9490812118a2adcc2cca27c0b5fca9c107761857b0e7ed382ab40edd45a25994efd16865495853aa52789ced6eb53561c8633237be5b4afd6eadbcf54301cdbfb073225230ca0869a45726fc41c63b2ff824731d132a34e984985abc57c556d7fc3cde25746c9e414fed9f3a140cad", 0xad}, {&(0x7f0000000040)="0c5697e783e8e6fff05f2d", 0xb}], 0x2, &(0x7f00000006c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x28}, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @multicast1, @dev={0xac, 0x14, 0x14, 0x14}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x38, 0x0, 0x7, {[@lsrr={0x83, 0x13, 0x9, [@local, @multicast1, @rand_addr=0x2, @local]}, @timestamp={0x44, 0x14, 0xfffffffffffffffb, 0x3, 0x4d35b760, [{[], 0x3fa}, {[@multicast1], 0x7}, {[], 0x7ff}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x200}}, @ip_retopts={{0x44, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x0, [@remote]}, @ra={0x94, 0x6, 0x401}, @cipso={0x86, 0x1c, 0x3, [{0x5, 0xf, "91e4d8a417174c6fdea9ff7373"}, {0x1, 0x7, "457aefcb6e"}]}, @ssrr={0x89, 0xb, 0xd532, [@broadcast, @broadcast]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x150}, 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:28 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x300, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:28 executing program 3: pipe(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x100) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x46, 0x1, 0x5be, "c65fba32455ecda509f9b54fc92e2416", "58255c93c4d52aad08016cc047ca48d8690bd863d7828482e1b615ba3cd21b416406f54bdf72fa2e4ac63657070f060a5d"}, 0x46, 0x2) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x105) ioctl$RTC_AIE_OFF(r0, 0x7002) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:28 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x104}, 0xc, &(0x7f0000000480)={&(0x7f0000000100)={0x188, r1, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff0001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff801}]}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2a0cd111}]}]}]}, 0x188}}, 0x8000) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1245.417171] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.443228] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:28 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) [ 1245.462611] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.523074] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.575369] audit: type=1400 audit(2000000548.203:117): avc: denied { create } for pid=23993 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:28 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2a05c00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000180)={0x100, 0x3f, 0x1, 0x6, 0x4, 0x0, 0x7, 0x8, 0x1, 0x1, 0x0, 0xffffffffffffff00}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) lseek(r0, 0x0, 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x8000, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000100)) 03:42:28 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x2, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe(&(0x7f0000000040)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1245.624094] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.643594] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.667703] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:28 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) fdatasync(r0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1245.750091] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.768548] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:28 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) ioctl$VT_RELDISP(r0, 0x5605) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz0\x00') [ 1245.798006] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.826847] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.886596] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.897354] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.905521] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1245.943724] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:31 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)=r1) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x41) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c40000000000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:31 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:31 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x14000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:31 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f0000000100)=0x8) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:31 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1248.411022] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:31 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4200, r0, 0x3, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1248.472020] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1248.508320] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:31 executing program 3: pipe(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x40) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x4e24, @empty}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x182, 0x0, 0x0, 0x0, 0x593d, 0x0, 0x9, 0xfffffffffffffffd, 0x80000001}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000080)) [ 1248.528383] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:31 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x9) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x810000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x0, 0x2}, 0x20) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000035) getpeername$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000200)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, 0x7ff, 0x40, 0x2, 0x400, 0x3ff, 0x20, r5}) fcntl$setstatus(r2, 0x4, 0x80000000002c00) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x8, 0x2, 0x4, 0x1, 0x0, 0x2, 0x20008, 0x4, 0x5, 0x40000000000000, 0x71, 0x1f, 0xfffffffffffffffb, 0x100000000, 0xb2, 0x6, 0x0, 0x5, 0x10000, 0x4, 0xfffffffffffffffb, 0x8a, 0x4, 0x3, 0x8000, 0x8001, 0x5f3d9737, 0x3, 0x5, 0x0, 0x6, 0x4, 0xeeea, 0x5, 0x3, 0x9038, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x4000, 0x3ff, 0x0, 0x2, 0x6, 0x6, 0xefaa}, 0x0, 0x6, r0, 0x8) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1248.593032] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:31 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000700)=0x1c) r0 = syz_open_dev$evdev(&(0x7f0000000740)='/dev/input/event#\x00', 0xf7f, 0x2) read(r0, &(0x7f00000005c0)=""/250, 0xfa) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x181040, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/enforce\x00', 0x10000, 0x0) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000040)=""/8, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x94eb, 0x7ff}, {0x40}], r3}, 0x18, 0x0) r4 = getpgrp(0xffffffffffffffff) fremovexattr(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f0000000140)={0xffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() ioctl$TIOCSTI(r1, 0x5412, 0x7) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r5, 0x0, 0x0) accept4$inet6(r1, 0xffffffffffffffff, &(0x7f0000000580), 0x80000) ioctl$KDSKBLED(r1, 0x4b65, 0x7) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000100)={0x10001, 0x10000000000000, 0x3, 0x9, 0x20, 0x3}) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000540)={0x40, 0x7}) tkill(r5, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:31 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x5, 0x4) [ 1248.668412] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1248.694563] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:31 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x2) getuid() socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) time(&(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 1248.792603] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:31 executing program 3: pipe(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) clone(0x7f34a729876d5530, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0xffe0000000000000, 0x2, 0x3, 0x3, 0xb9, 0x1}, 0x20) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KDADDIO(r1, 0x4b34, 0xffffffff00000001) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, &(0x7f0000000480)='#vmn\xaf\x92\x00\x00') [ 1248.809694] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1248.850536] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1248.870267] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1248.881463] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1248.975791] audit: type=1400 audit(2000000551.603:118): avc: denied { create } for pid=24074 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1249.006263] cgroup: cgroup2: unknown option "#vmn¯’" [ 1249.064594] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1249.103763] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1249.107188] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:34 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) getpeername$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x7fffffff, 0xe0000000000}, {0x3, 0xfff}]}, 0x14, 0x3) 03:42:34 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000004b80)='/dev/full\x00', 0x2, 0x0) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000004c00)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x2004, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\x13\xe7\x91\xe5\xb0!x\xd7{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) tkill(r2, 0x22) sendmsg$sock(r1, &(0x7f0000004b40)={0x0, 0x0, &(0x7f0000004a40)=[{&(0x7f0000004600)="dbcc5b9ec0a5d9da24a683c737dccdf5d64f622867986f33791f57818486644c47c015d9ba7081b8bac793b4de2b17aeec007e8e199c780bd3b6baf9ed78d496fcc2b76a045a72f59540ebec71ab5279c911b3e916942571b929c3064f25e7270ff0b5fae81ab45871a6357ab4f0578d617e265496ef130a208a10cd5997d27f30cbd4535269583c0bf3f59e", 0x8c}, {&(0x7f00000046c0)="43256fd7da1616873ea1068d9c4399ccb45ee9a5d3841c87f84c070144242333ac5b32", 0x23}, {&(0x7f0000004700)="a4deca3c65993310db004d144ae65b699e582b51c3f73217653fc1d89c4702765f02fd4097bb5cff2bc733745f542fb9aa3928781edcfa42c96f089858df6d159efd5215a2ae40a827", 0x49}, {&(0x7f0000004780)="21625c5ca82c5c1a84d2ab2176df01f37f27efd6d302a92c6d2383e52b0fe658b8a822ad3f4826b183a86afbf2fc07dbe2a59cce78dcec823a37585d1ff72ac3b69abd474173c1f589c121e126b53bce27c1ed98b9ea02d0b4e009311799acc39fc427fbaa0e1e08f86b059c15e1c9599d4c27f77b2b6bc4d54f345d4ae02b8ce62e11396df8e278de2fcdb94ad2abecf5ee632cdec02a230d36880388112c300c18428b0601d6a53f9f11ffba4bf51a967e2120838a55ca3a85756f70a2ccd3060a0343b34797ca71ee737fe36d67bca7527b3e4d98d21127d761b956d28583805cabbc", 0xe4}, {&(0x7f0000004880)="d5f5a29681fd7857f072cc4f6e2b29ed3c2089b3dc3b1f8bd686b5b541d23e87dacfd234f1043ca7bd40409b0b69844b4555fb23d0845d1a4d1fdda29c7206f5422baf76b3c56bc437d3da7d5e754c02b6619585bcff2af1ab6b5e1b68460475b0729f7cdaf7835e767b5abdd781978ce2f6172f2532b2910729c682927194", 0x7f}, {&(0x7f0000004900)="7b18e6ff0d6ffb26c72bbf6add883e6079ef8c0062298a6e7707987834e632588a2d5f75f9cc2c0a7448aeb179cc9833d81d458ee0ce6da35ff2be9ed4556a0efaa8335502da3de4f52ed7b077bb006845ee37", 0x53}, {&(0x7f0000004980)="e6d090663bd4dcfcfbffb43a65c7fd034afa5aa0f256bd6822da3f470a51629d3290faa4e59789a3c606c56a35dd9af7f45a5a73c243c935856291e62f4db2d7409546506bf62475f43e64add70fe77bbee52efe59209d7aec73", 0x5a}, {&(0x7f0000004a00)="f15151f2a49ca93a6495d50e3d8712", 0xf}], 0x8, &(0x7f0000004ac0)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0xa979}}, @mark={{0x14, 0x1, 0x24, 0x1000}}, @timestamping={{0x14, 0x1, 0x25, 0x10001}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0x78}, 0x4) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvmmsg(r1, &(0x7f0000004380)=[{{&(0x7f0000000480)=@x25, 0x80, &(0x7f0000000780)=[{&(0x7f0000000500)=""/141, 0x8d}, {&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f00000006c0)=""/182, 0xb6}], 0x3, &(0x7f00000007c0)=""/255, 0xff}, 0x40}, {{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/207, 0xcf}, {&(0x7f00000009c0)=""/164, 0xa4}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/109, 0x6d}, {&(0x7f0000001b00)=""/143, 0x8f}], 0x5, &(0x7f0000001c40)=""/210, 0xd2}, 0x2}, {{&(0x7f0000001d40)=@alg, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001dc0)=""/239, 0xef}, {&(0x7f0000001ec0)=""/102, 0x66}, {&(0x7f0000001f40)=""/132, 0x84}, {&(0x7f0000002000)=""/177, 0xb1}], 0x4, &(0x7f0000002100)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000003100)=@pppol2tp, 0x80, &(0x7f0000003240)=[{&(0x7f0000003180)=""/152, 0x98}], 0x1, &(0x7f0000003280)=""/243, 0xf3}, 0x80c}, {{&(0x7f0000003380)=@caif=@rfm, 0x80, &(0x7f0000003840)=[{&(0x7f0000003400)=""/249, 0xf9}, {&(0x7f0000003500)=""/213, 0xd5}, {&(0x7f0000003600)=""/135, 0x87}, {&(0x7f00000036c0)=""/69, 0x45}, {&(0x7f0000003740)=""/192, 0xc0}, {&(0x7f0000003800)=""/20, 0x14}], 0x6}, 0x20}, {{&(0x7f00000038c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003980)=[{&(0x7f0000003940)=""/63, 0x3f}], 0x1, &(0x7f00000039c0)=""/20, 0x14}, 0x9}, {{&(0x7f0000003a00)=@xdp, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003a80)=""/212, 0xd4}, {&(0x7f0000003b80)=""/138, 0x8a}, {&(0x7f0000003c40)=""/47, 0x2f}, {&(0x7f0000003c80)=""/91, 0x5b}, {&(0x7f0000003d00)=""/3, 0x3}, {&(0x7f0000003d40)=""/56, 0x38}, {&(0x7f0000003d80)=""/219, 0xdb}, {&(0x7f0000003e80)=""/58, 0x3a}], 0x8, &(0x7f0000003f40)=""/99, 0x63}, 0x6}, {{&(0x7f0000003fc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000004340)=[{&(0x7f0000004040)=""/66, 0x42}, {&(0x7f00000040c0)=""/224, 0xe0}, {&(0x7f00000041c0)=""/80, 0x50}, {&(0x7f0000004240)=""/213, 0xd5}], 0x4}, 0x456e}], 0x8, 0x2, &(0x7f0000004580)) recvfrom$packet(r3, &(0x7f0000000400)=""/39, 0x27, 0x40010121, &(0x7f00000045c0)={0x11, 0x3, r4, 0x1, 0x200}, 0x14) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:34 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x1, &(0x7f0000000040)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:34 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x6, 0x10001) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) inotify_add_watch(r2, &(0x7f0000000200)='./file1\x00', 0x3e042872c63cf5bb) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) uname(&(0x7f0000000040)=""/38) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000004c0)) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) 03:42:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:34 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:34 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') rt_sigreturn() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x22) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000180)) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)=""/199) 03:42:34 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r1) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1251.824863] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1251.860787] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x0, 0x7}, @sack_perm, @mss={0x2, 0x100000000}, @window={0x3, 0x6}, @mss={0x2, 0xfffffffffffffc01}, @sack_perm, @window={0x3, 0x0, 0x10001}, @mss={0x2, 0xb3b9}], 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1251.882016] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1251.913854] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:34 executing program 3: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:34 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000000)=0x2, 0x81, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000600)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f00000006c0)={&(0x7f00000005c0), 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r3, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000580)=0x2) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1252.014056] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:34 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000200)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)="429f833dfda2a97772966cc8b988b48f4f8f9f8c519d96fa14f5f7141dba704265a869bb", 0x24}, {&(0x7f0000000480)="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", 0x1000}], 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="2000000000010000b7ed000000000000", @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0], 0x40, 0x890}, 0x4008044) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1252.081095] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1252.202621] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1252.230264] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1252.282366] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:35 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2a0800) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x7fff}]) 03:42:35 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@rand_addr=0x2, @in=@loopback, 0x4e23, 0x8, 0x4e22, 0x8, 0x2, 0xa0, 0xa0, 0x0, 0x0, r2}, {0x7, 0xffff, 0xa7, 0x3, 0x3, 0x3ae8, 0x81, 0x2}, {0x40b9d56d000000, 0x1, 0xfffffffffffffffc, 0x1}, 0x7, 0x6e6bbd, 0x1, 0x0, 0x1}, {{@in=@multicast2, 0x4d2}, 0xa, @in=@multicast1, 0x3502, 0x4, 0x1, 0x10001, 0x31d029f3, 0x5, 0xc4}}, 0xe8) r3 = fcntl$getown(r0, 0x9) perf_event_open(0x0, r3, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() mkdir(&(0x7f0000000280)='./file0\x00', 0x109) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x100, 0x0) ioctl$TIOCGSOFTCAR(r5, 0x5419, &(0x7f0000000080)) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:35 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:35 executing program 2: write(0xffffffffffffffff, 0x0, 0x54d) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x400000, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x1, 0x9, 0xa583}}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xa) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x88000040}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x800, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004845) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1252.382636] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:35 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x1080, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3e0000}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x8}}], [{@permit_directio='permit_directio'}]}) [ 1252.453265] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1252.520212] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1252.538565] audit: type=1400 audit(2000000555.163:119): avc: denied { create } for pid=24156 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:35 executing program 0: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) fcntl$getflags(r0, 0x401) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) recvmsg(r1, &(0x7f00000025c0)={&(0x7f0000000180)=@hci, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000200)=""/38, 0x26}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f0000002480)=""/49, 0x31}], 0x5, &(0x7f0000002540)=""/98, 0x62}, 0x40000000) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) linkat(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000100)='./file1\x00', 0x400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x30) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) keyctl$set_timeout(0xf, 0x0, 0x9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, 0x0}}], 0x1eb, 0x0) [ 1252.540328] audit: type=1400 audit(2000000555.173:120): avc: denied { write } for pid=24156 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1252.605837] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1252.660276] audit: type=1400 audit(2000000555.293:121): avc: denied { read } for pid=24156 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:35 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0xe01cc45559e059bc, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000600)=""/4096) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RFLUSH(r3, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x10, 0x70bd27, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0xe3edaf7a438a579b) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000280)={0x7ff, 0x4, 0x7fffffff, 0x100000000, 0x17, 0x101, 0x1, 0x9, 0x6, 0xd5}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstatfs(r2, &(0x7f0000001600)=""/68) socket$inet(0x2, 0x72a52525624b44f5, 0x9) r5 = gettid() write$selinux_user(r3, &(0x7f0000000100)={'system_u:object_r:setfiles_exec_t:s0', 0x20, 'system_u\x00'}, 0x2e) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f0000000480)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\x90\x8d\x82\x17\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') dup3(r0, r2, 0x80000) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x22) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10020000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r6, 0x800, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1252.668264] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1252.669595] audit: type=1400 audit(2000000555.293:122): avc: denied { create } for pid=24156 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1252.670014] audit: type=1400 audit(2000000555.293:123): avc: denied { write } for pid=24156 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:35 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='cpuset\x00') creat(&(0x7f00000004c0)='./file0\x00', 0x40) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000180)=""/70) pipe(&(0x7f00000000c0)) nanosleep(&(0x7f0000000480)={0x0, 0x1c9c380}, 0x0) [ 1252.830999] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 1253.015745] audit: type=1400 audit(2000000555.643:124): avc: denied { create } for pid=24175 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1253.078788] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.188049] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.277544] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.384676] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.410512] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:36 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4200, r0, 0x81, 0x10a) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:36 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x100) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r3 = dup3(r0, r1, 0x80000) write$P9_RREADLINK(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1004000000c385511365d5487d4ce92bfdcaec1b002e2f6680d0bdb45b6f0bffa42acb64e50fce57ad5b675f09cebabb31252d94bd1e332f4295120120ef6679b20e8a4efd73364c989ac10c473e78b77f6603506257911232c674823c178b3d03cb3b3f26a985c4864f6d73129381f131613d1b0870096cdec25319257a168f8fd6843e98e65f36e395eed527d07a5f611b80098bea3da35a989f21f2"], 0x10) 03:42:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0xa2a5, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="50000000100005076000"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000a0010000000250012000800010076657468000000001800021ee500010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x200}}, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 03:42:36 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:36 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x80, 0x3, 0x442aee5d, 0x5, 0x0, 0xf5ce, 0x100, 0xdc6ca8c2f48e3d0d, 0x2, 0x4, 0x81, 0x401, 0x0, 0xfff, 0x1, 0x0, 0x8, 0x5, 0xffffffffac344fbd, 0x800, 0x8, 0x3, 0x20, 0xfff, 0x35, 0x9, 0x9, 0x8, 0x4, 0xfffffffeffffffff, 0x74, 0x401, 0xfffffffffffffff9, 0x4, 0x300, 0xfc00, 0x0, 0x4b, 0x96ca52a29ba1447b, @perf_config_ext={0x8, 0xffffffff}, 0x10000, 0x4, 0x3, 0x8, 0x20, 0x1000, 0x3}, r1, 0x7, 0xffffffffffffffff, 0xa1187defc3827b06) r2 = gettid() r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101040, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x680}, 0xc, &(0x7f0000000140)={&(0x7f0000000c40)=ANY=[@ANYBLOB="cb030098e0116cdd4366e77954", @ANYRES16=r4, @ANYBLOB="000828bd7000fddbdf25020000008c000100100001006574683a6772653000000000140001006574683a69703665727370616e300000100001006574683a6e6c6d6f6e300000100001007564703a73797a32000000002c0004001400010002004e210000000000000000000000001400020002004e20ac1414aa00000000000000000800030000010000100001007564703a73797a32000000001c000900080002000900000008000200840000000800020001000000280005001c0002000800030008000000080002000600000008000300ff03000008000100696200001400090008000100010001000800010000000080dc0005004c0002000800040008000000080001001f000000080004000300000008000100110000000800030000020000080002000000000008000200050000000800030002000000080002007200000008000100657468001400020008000200070000000800010018000000440002000800040001800000080002003f00000008000200010000000800020074102c5e080001001e0000000800040034000000080001001d00000008000200b400000008000100696200001c0002000800040005000000080001001200000008000200040000000800010065746800380002000400040008000100040000000800010008000000080002000080000008000200a90000000400040008000100010000000400040010000200080002000000000004000400c4000500140002000800030002000000080003000100000014000200080003000002000008000200fdffffff3400020008000100080000000800040005000000080003000500000008000400070000000800010000000000080004000200000008000100696200000800010075647000080001006574680044000200080003000400000008000300820a000008000400010001000800020002000000080003000800000008000200070000000800020001010000080002000900000008000100657468002c00060004000200080001000300000008000100050000000400020004000200080001007d050000040002009c00040014000700080001000e00000008000300010400001400010062726f6164636173742d6c696e6b00001c0007000800030001000000080003000010000008000400060000001400010062726f6164636173742d6c696e6b000014000700080002008100000008000300060000000c00010073797a310000000014000700080001000200000008000200060000000c00010073797a31000000009a2b99cbf33814d23845498c3289bb102289cf29b20e3d45be6092dd9a4e905e6b9271666e2707565344b2851eb4cde43b1a60ce4e90e482047fc669d109dac0ba4552635d"], 0x3a8}, 0x1, 0x0, 0x0, 0x10}, 0x40000) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='cgroup2\x00', 0x0, &(0x7f0000000480)='\x00') ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) getpriority(0x2, r1) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1253.435998] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:36 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x6, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='cgroup2\x00'}, 0x30) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:36 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x73f21b7baf50ff14, &(0x7f0000000080)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1253.513996] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.526233] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.599444] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. 03:42:36 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000240)=0x6e) r1 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, 0x0, 0x0) r3 = dup(r1) setsockopt$inet6_tcp_int(r3, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0x208, 0xa5) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x4, @mcast1, 0x101}}, 0x0, 0x8, 0x0, "9fc72b543b28dd4728c3988b7adea76fa59f716c731782304d2a8b2baf8c1724fb01b86d7c1d88f3c7322926d8f0fcdb51b5df3ba8b696320eb85ae1bd8e6af048c54f27e0dad819d7cb50aaa2bc300f"}, 0xd8) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f00000000c0)=0x7, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x401, 0x8, @mcast2}, 0x1c) setns(r3, 0x8000000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000005c0)=ANY=[@ANYBLOB="d6f33178ed2c03e733bb091b45d16771449a33727c29d0b4be5c2f72d4993fb9be724c0ef653d19240dbb76e22e8a88b544644c22476f22f6bf2ad64cf989c3dd0f64bc678ba8d9809ca95c5d5e1df6b71d4fe77244fff49fd722c9026bbc7141f49e3a5e85d2a7d899a9be0b2dc57948be063ff5651831986dd84232dc9782f5eafd03e9e55bc2563f2a1751d7557feded634a8c72d3dc696ad60a696d503091c745089157f5a4384b17bf35850402daae8c633ccde7a98b8273b8981419a19dce99b374a30d09a828dd5ae9c05c569015e73b08b85d7bcd0035db21c5c1480bbe6fc8b062a23741735467d15e8dcd05b18ed49f113a8eb9252541f51349dbc4b248bf44adaf7afc61127f6c9b47ba1a1d0d8446eea037d822b4a7e1e77e4832b9caf4df286b355591e63a4077a94f7e6eeab9daca375ba5497e70d699e36d5ad21163e4ab83a1be64a7a00"/347], 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) open(0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) clock_nanosleep(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) sendto$inet6(r1, 0x0, 0xffffff91, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x6e) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r4, 0x7fff) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000ffffbffe) [ 1253.724517] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.887075] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.950170] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1253.983440] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:36 executing program 0: pipe(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) rt_sigqueueinfo(r0, 0x31, &(0x7f00000001c0)={0x31, 0x5, 0x331}) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xd24681ec776e7f13) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='cgroup2\x00', 0xffffffffffffffff}, 0x30) ptrace$setregs(0xf, r1, 0xd3, &(0x7f0000000100)="add1e9de9a77806da77f8e2a3f4433b385810a5b4c325248a66936f070d3540b4f21ea0e5a7291e5fee3a366e84ad053d7952e30f88c273b96a87ea73d233ad7") read(0xffffffffffffffff, 0x0, 0xffffffffffffffcd) r2 = socket(0x3, 0x3, 0x3ff) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioprio_set$pid(0x1, r1, 0x0) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:36 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r2 = dup2(r0, r0) r3 = getuid() setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000080)=@req={0x3ff, 0x6, 0x8, 0x5}, 0x10) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() r7 = getuid() r8 = getgid() sendmsg$netlink(r2, &(0x7f0000001e00)={&(0x7f00000009c0)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001b40)=[{&(0x7f0000000a00)={0x1110, 0x14, 0x20, 0x70bd26, 0x25dfdbfe, "", [@typed={0x8, 0x12, @u32=0x81}, @generic="64f2b6d4f33fdbcae17962339ca0628cd2a7686542e2ef60585b0b58af2e6d67c1dca14fdf32371b61311748fd9e4eb8b529403fed7af52dc4372397a13e72746afb576b8a0d5c7ab538c3a97422fb5d4da8520214b1f38adcd20234cc1da6dd778745cdc6755060e2417d7e0764693d9822861ea6ee4b1f0bb600b872ad39c35f7bb5ff7dd3106e9dd7ab287a3c6b9ec047e1c4a661e8d19ffda9373c6e7e51d4348ef14658eef8dcc7da3a15c4c85df7273ac430fbbfdcaae7b991134b6b46a987b01f44cd8d8cd9c343bb3a7a4b1f593791e1f67b097f92d5ef8b11a3f1026e59e9c935156ab15db3d4e9f2ea857c0ecb16396141", @generic="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", @generic="b2"]}, 0x1110}], 0x1, &(0x7f0000001d00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="ed607c8fc900f9e8093800000000200000000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0xe0, 0x40}, 0x4000) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:36 executing program 2: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cgroup.max.descendants\x00', 0x2, 0x0) write(r0, 0x0, 0x249) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1254.207234] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 1254.329960] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:37 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) recvfrom$unix(r0, &(0x7f0000000480)=""/197, 0xc5, 0x1, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e21}, 0x6e) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1254.390795] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1254.452407] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1254.611136] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1254.664943] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 03:42:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0xc9}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f000007f000/0x1000)=nil) epoll_pwait(r1, 0x0, 0x0, 0x6, 0x0, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1255.066455] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1255.087034] audit: type=1400 audit(2000000557.693:125): avc: denied { create } for pid=24266 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:37 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) io_setup(0xbf88, &(0x7f0000000040)=0x0) io_getevents(r1, 0x7, 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000080)={0x0, 0x989680}) 03:42:37 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 03:42:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0xc9}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f000007f000/0x1000)=nil) epoll_pwait(r1, 0x0, 0x0, 0x6, 0x0, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1255.132659] cgroup: cgroup2: unknown option "" 03:42:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) r2 = dup(r1) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x10000}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r1, r3) fcntl$getflags(r0, 0x3) recvfrom$inet(r4, 0x0, 0xffffff27, 0x2, 0x0, 0x800e0050e) shutdown(r2, 0x0) [ 1255.566889] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1255.575117] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:39 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:39 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0xffffffffffffff2d) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x2000}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:39 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:39 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x88800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1257.218079] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1257.265331] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1257.307111] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1257.327587] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:40 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c, 0x0) write(r0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:40 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) finit_module(r0, &(0x7f0000000080)='eth1.eth1\x00', 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000100)="f01a36aef4fb3c0ec94ae334ddf9828ff82dec1dce549c5ee47e909f3f44230475bf1b9e1326d9ad5a945424fda296875767de54770f28e04410439e3d645c3f35dbe536d0ef84a3d4e9d09d936f48db96bec9a7b1", &(0x7f0000000200)=""/51}, 0x18) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz0\x00', {0x80, 0x4, 0x9, 0x1}, 0x28, [0x8, 0x9, 0x6, 0x6, 0x2, 0x100000001, 0x5, 0x3, 0x1, 0x1, 0x40, 0x1ff, 0x401, 0xffffffff, 0x1, 0x3, 0x4, 0xbf6a, 0xcfa6, 0x0, 0x80000000, 0x80000000, 0x3, 0x10, 0x58a5, 0x4, 0x7fff, 0x5, 0x4, 0x401, 0x8, 0x3f, 0x0, 0x4, 0x9, 0x0, 0xd275, 0x4, 0x22e, 0x80000000, 0x7, 0x7, 0x81, 0xfffffffffffffffa, 0x10000, 0x1, 0x3, 0x100000001, 0x4bc1, 0x300000000, 0x8, 0x0, 0x4, 0x0, 0x3, 0x8, 0x2, 0x0, 0x7ff8, 0x2, 0x0, 0xfae3, 0x0, 0x4], [0xa00f, 0xfffffffffffffff7, 0xc000, 0xffffffffffffff80, 0x20, 0x9, 0xa3, 0x0, 0x7, 0x303a, 0x8, 0x2, 0x8, 0x3, 0x3, 0xfffffffffffffffa, 0x8000, 0x7, 0x3de5, 0xffffffffffffff65, 0x10001, 0x0, 0xdef, 0x3ff, 0x2479c7a7, 0x4, 0x3, 0x100000001, 0x0, 0x3, 0x1, 0xfffffffffffff801, 0x767, 0x7, 0x10000000, 0xfffffffffffffffe, 0x9, 0x3, 0x3, 0xe4, 0x800, 0x4828, 0x8, 0x3, 0x6, 0x6, 0x400000000, 0x3, 0x2, 0x0, 0x9, 0x3, 0x20, 0x8, 0x1, 0xffffffffffffff81, 0x7, 0x4, 0x8, 0x6, 0x4, 0x4, 0x80, 0x40], [0x3, 0x4, 0x100000001, 0x5, 0x5b01, 0x3, 0x7fffffff, 0x101, 0x100, 0x3, 0x401, 0x8, 0x4, 0x1ff, 0x8, 0x101, 0x5, 0x1, 0x3, 0x3, 0x3, 0xfff, 0x7fff, 0xff, 0x2, 0x1000, 0x6, 0x2, 0x9, 0xff, 0x80000000, 0x3, 0x200000000000, 0xfff, 0x3, 0x9, 0x400, 0x5, 0x9, 0x3, 0x81, 0x48000000000, 0x4, 0x9, 0x0, 0x0, 0x5865, 0x1, 0x80, 0x8, 0x14000000000000, 0x0, 0x8, 0x200, 0x9, 0x9, 0xffffffffffffffff, 0x6e, 0xe27, 0x2, 0x80, 0x101, 0x5, 0x10001], [0x7, 0x80000000, 0x5, 0xfff, 0x8000, 0x2, 0x6, 0xffffffffffff6bdf, 0x800, 0x81, 0x4, 0x6, 0x3, 0x0, 0x8, 0x7311, 0x56c, 0x200, 0xff, 0x8, 0x1, 0x8, 0x8001, 0x81, 0x3, 0xffffffff, 0x5, 0xffc0000, 0x80000001, 0x8, 0x982a, 0x2, 0x1, 0x5, 0x7, 0x3f, 0x200, 0x6015, 0x8, 0x6, 0x5, 0x6, 0x4d, 0x3, 0x6, 0x5, 0x3, 0x83, 0x1, 0x3, 0x3ff, 0x1, 0x8, 0x4, 0x7, 0x7, 0x5, 0x4, 0x3, 0x8, 0x0, 0x5, 0x2, 0x1f9270f38000000]}, 0x45c) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 03:42:40 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x1) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) get_robust_list(r0, &(0x7f0000000180)=&(0x7f0000000140)={&(0x7f0000000080), 0x0, &(0x7f0000000100)}, &(0x7f00000001c0)=0x18) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:40 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:40 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) openat$cgroup_type(r1, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:40 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000100)={'bcsf0\x00', {0x2, 0x4e20, @local}}) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x101000, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x14) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1257.615447] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1257.638521] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:40 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00') [ 1257.764837] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1257.807756] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1257.907112] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1257.972909] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1258.055171] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1258.064931] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:42 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:42 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00') capget(&(0x7f0000000180)={0x20080522, r0}, &(0x7f00000001c0)={0x2a1, 0x1, 0x3, 0x3f, 0x1, 0x3}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:42 executing program 0: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ptrace$peek(0x1, r1, &(0x7f0000000100)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) 03:42:42 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:42 executing program 0: pipe(0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, 0x0, 0xffffffffffffff55) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1260.258467] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1260.266469] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1260.301771] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:42 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) write(r0, &(0x7f0000000480)="532bd5646047f803c67ffa21dfb49d00df9a8b4e24acc961516109194633cbfa4c4d76ebba390be841d1a68eb2d1aebe4898d71656ab2a3199fc9e906732157df0d510bb612ae125967cbd09a047fdd7f81b132473c43725171d9a24af5218c8c54a70d8c96afc68a6c70c2e8eab8472a6fa4453f3c5375b3a1f7737a283e24a19fcd3ba", 0x84) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x200000, 0x1) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000100)='syz0\x00') tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1260.343617] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1260.396196] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1260.447138] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1260.448833] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1260.494408] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1260.565350] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:43 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:43 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000080)={0x3, 0x1, 0x1, 0xffffffffffffffff}) dup(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x114) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:43 executing program 0: pipe(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x4) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='cgroup2\x00\xcb\xdb\x97\xdd\xb5%\xedC\xe1|\xda\xb9\xe9\xe7\xdaO\\sL\x868\xcb:\xfd\xb6\x86y\x0f\xa6\x95\xbf\xa4\xf9\xc3\xcd\xe9\x88U\xc5\xa4\xda<\xa3_\xbe=\xe0U\xc5\xfb\xd8\xb0kf\xeedX#\x00'/81, 0xefe7398e0d20e90, &(0x7f00000001c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x80\x00\x00\x00\x00\x00\x00\x00\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x03\x00\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0xd9a3ab0cf8012b46) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() getresgid(&(0x7f0000000140)=0x0, &(0x7f0000000400), &(0x7f0000000440)) getresgid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) r6 = getgid() stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000840)=0x0, &(0x7f0000000880), &(0x7f00000008c0)) setgroups(0xa, &(0x7f0000000900)=[r0, r1, r2, r3, r4, r5, r6, r7, r8, r9]) 03:42:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) 03:42:43 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1260.795283] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1260.851948] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1261.045758] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:45 executing program 3: pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) read(0xffffffffffffffff, 0x0, 0xffffffffffffff55) r0 = socket$inet(0x2, 0x4000000000000005, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:45 executing program 0: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:45 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) 03:42:45 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x10000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='wchan\x00') ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x83ec, 0x30, 0x1, r1}) r2 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000480)={0x0, 0x0}) fcntl$setownex(r3, 0xf, &(0x7f0000000180)={0x2, r4}) write$evdev(r0, &(0x7f00000001c0)=[{{}, 0x17, 0x7, 0xc7f6}, {{}, 0x11, 0x8, 0x4}, {{0x77359400}, 0x3, 0x9, 0x4}, {{0x0, 0x2710}, 0x14, 0x2, 0x287}, {{}, 0x12, 0x69, 0xfff}], 0x78) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() fcntl$setflags(r2, 0x2, 0x1) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r5, 0x0, 0x0) dup2(r2, r2) tkill(r5, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:45 executing program 0: pipe(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) chown(&(0x7f0000000200)='./file0\x00', r1, r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x801, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000680)) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=""/10) lsetxattr$trusted_overlay_origin(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='trusted.overlay.origin\x00', &(0x7f0000000740)='y\x00', 0x2, 0x1) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)=""/215, 0xd7) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f00000005c0)={@rand_addr="246f675e9917610b145d07ddbc3c19a2", 0x80, r0}) ioctl$TUNSETOWNER(r4, 0x400454cc, r1) [ 1263.386506] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:46 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='cgroXp2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x22) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1263.486588] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:46 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:46 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000180)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x2002, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000480)=""/230) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1263.725733] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1263.755079] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:46 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1263.786256] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:46 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:46 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1263.913170] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1263.953064] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1264.100620] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1264.116222] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:48 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x200000, 0x0) write(r0, 0x0, 0xffffffffffffff1d) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r3 = accept4(r1, &(0x7f0000000180)=@in, &(0x7f0000000100)=0x80, 0x80800) connect$netlink(r3, &(0x7f0000000480)=@unspec, 0xc) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:48 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) accept4$unix(r0, &(0x7f0000000180), &(0x7f0000000100)=0x6e, 0x800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$getenv(0x4201, r1, 0x8, &(0x7f0000000480)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:48 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:48 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) ptrace$pokeuser(0x6, r1, 0xffffffff, 0x3) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:48 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:48 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x125881, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40000, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x80000, 0x2) syz_open_dev$mice(&(0x7f00000058c0)='/dev/input/mice\x00', 0x0, 0x80880) syz_open_dev$mice(&(0x7f0000007e80)='/dev/input/mice\x00', 0x0, 0x80000) socketpair(0x5, 0x6, 0x7, &(0x7f0000007ec0)={0xffffffffffffffff}) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000080)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1266.322465] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1266.377069] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1266.379729] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1266.451507] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1266.467566] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:49 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='cgroXp2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x22) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1266.492719] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1266.505056] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:49 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) chmod(&(0x7f0000000100)='\x00', 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="757365df9815b8"]) 03:42:49 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x200000, 0x0) write(r0, 0x0, 0xffffffffffffff1d) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r3 = accept4(r1, &(0x7f0000000180)=@in, &(0x7f0000000100)=0x80, 0x80800) connect$netlink(r3, &(0x7f0000000480)=@unspec, 0xc) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:49 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x14) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xf54da64db77ca2a3, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:49 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:49 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x200000, 0x0) write(r0, 0x0, 0xffffffffffffff1d) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r3 = accept4(r1, &(0x7f0000000180)=@in, &(0x7f0000000100)=0x80, 0x80800) connect$netlink(r3, &(0x7f0000000480)=@unspec, 0xc) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1266.611810] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1266.624500] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:49 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x8, 0x5) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1266.681196] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 1266.778636] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1266.812354] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:49 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write(r0, 0x0, 0xffffffffffffff10) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x36) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) gettid() socket$inet_udplite(0x2, 0x2, 0x88) inotify_init1(0x80000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) clock_gettime(0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) nanosleep(&(0x7f0000000540)={r3, r4+30000000}, 0x0) [ 1266.840399] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1266.946160] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:49 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x64a340, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1267.067240] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:49 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:49 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1267.123599] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1267.435368] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1267.463962] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1267.715761] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:52 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='cgroXp2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x22) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:52 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x13) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:52 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:52 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) 03:42:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x9}, @sack_perm, @timestamp, @mss={0x2, 0x5}, @mss={0x2, 0x8d3d}, @mss={0x2, 0x1c0000000000000}, @mss={0x2, 0x6}], 0x7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65eb024f9f80a30000002200001000d0d9037d71c54c400000000000004000"/73], 0x1) getpeername$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@mcast2, 0x23, r3}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x1000, &(0x7f00000000c0)=""/187) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) r4 = getgid() ioctl$TUNSETGROUP(r1, 0x400454ce, r4) [ 1269.683240] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0x4) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x9, 0x4eba, [0x0, 0x7, 0x2, 0x100000001, 0x7], 0xfffffffffffffffc}) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0xd) 03:42:52 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1269.747001] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1269.776407] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:52 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000040)=0x78) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:52 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000480)=""/250, 0xfa) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) inotify_add_watch(r1, &(0x7f00000001c0)='./file0\x00', 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)) 03:42:52 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) 03:42:52 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000180)=@hci, &(0x7f0000000100)=0x80) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1270.056012] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1270.080648] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:52 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = getpgid(0xffffffffffffffff) sched_rr_get_interval(r1, &(0x7f0000000040)) clone(0x2102000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write(r0, &(0x7f0000000100)="229dc653a3c186a81a8a39437c4598566126c3adf7a17bf172d97d4bfeab53f5aa0aee4fb476d960191bfaec6cff70dbe0531e25df8becf6fc733fd359a456dee72cf073cf0304d9045801aab774db1d8d3c81112d1a194ba6d5bf7c0399015b31aca090ded5ed84fa8c2c97cd427870bce1b9160c5294834d3beff4058f97e9c59ddd465c73fc9f7637b0e7b4707c4c62a63876adffdac19e0045e44255d8daf3309ef812a8c2270d528068093f745723aed7b5ef91f50f36474bdd84", 0xbd) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREADLINK(r3, &(0x7f0000000200)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) [ 1270.126172] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:52 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) [ 1270.206061] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1270.244716] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1270.270091] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1270.290857] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1270.355331] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1270.456468] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1270.586339] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:55 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f0000000040)={0x0, 0x1c9c380}, 0x0) 03:42:55 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:55 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000480)=""/250, 0xfa) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0xfdb1f78cfe891b35, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:55 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0xfffffffffffffe6b) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1272.629952] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1272.662323] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1272.698320] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1272.712083] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f00000002c0)=""/234) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500100000000000001f0010000600f7ff9f05100058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000000)=""/122, &(0x7f00000000c0)=0x7a) tkill(r2, 0x3c) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f0000000180)=""/36, 0x24) 03:42:55 executing program 3: socket(0x9, 0x800, 0x3) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) dup(0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x15) accept4$inet(r1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:55 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:55 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) r2 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000040)) r3 = dup2(r0, r0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x5) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:55 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:55 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) gettid() nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:55 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/43, 0x2b}], 0x1, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0xb79) [ 1272.838946] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:55 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r3, r4/1000+10000}}, 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpeername$packet(r0, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000600)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000d00)={'team0\x00', 0x0}) getsockname$packet(r2, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14) getpeername$packet(r2, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000f40)=0xe8) accept$packet(r2, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000fc0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001000)={0x0, @remote, @remote}, &(0x7f0000001040)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001240)={'yam0\x00', 0x0}) getsockname$packet(r2, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000012c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001680)={{{@in, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000001780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000017c0)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000018c0)=0xe8) getsockname$packet(r2, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000001ec0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001a40)={0x43c, r5, 0x800, 0x70bd28, 0x25dfdbfc, {}, [{{0x8, 0x1, r6}, {0x4}}, {{0x8, 0x1, r7}, {0xec, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xe378}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0x138, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x5, 0x1, 0x7, 0x3}, {0x0, 0x4362522b, 0x162, 0x1}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0xc8, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x509}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}]}}, {{0x8, 0x1, r18}, {0xc4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7ff, 0x101, 0x4, 0xfffffffffffffff7}, {0x80, 0x0, 0x9, 0x4}]}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x100000000, 0x3, 0x4000000, 0x7f}]}}}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x4080}, 0x10) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1272.933538] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1272.987289] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1273.010017] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:55 executing program 2: epoll_create(0x3) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001080)={&(0x7f0000001040)='./file0\x00', 0x0, 0x18}, 0x10) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000010c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write(r0, 0x0, 0x516f9d5f) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) r4 = getegid() lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xe8) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000540)='/dev/loop0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='fuseblk\x00', 0x10040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xffffffffffffffff}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type'}}, {@dont_appraise='dont_appraise'}, {@smackfsdef={'smackfsdef', 0x3d, 'user'}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@fowner_lt={'fowner<', r6}}, {@fowner_gt={'fowner>', r7}}]}}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r8, r9, r10}, 0xc) r11 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1273.037987] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1273.082122] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1273.096125] audit: type=1400 audit(2000000575.723:126): avc: denied { create } for pid=24686 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1273.096569] audit: type=1400 audit(2000000575.723:127): avc: denied { write } for pid=24686 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1273.182273] audit: type=1400 audit(2000000575.813:128): avc: denied { read } for pid=24686 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:55 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x323) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x8) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000100)=0x4) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) fcntl$addseals(r0, 0x409, 0x4) [ 1273.193452] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1273.195001] audit: type=1400 audit(2000000575.823:129): avc: denied { create } for pid=24681 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1273.195565] audit: type=1400 audit(2000000575.823:130): avc: denied { write } for pid=24681 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:56 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000000eff4)={0x10}) shutdown(r0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000040)={@rand_addr, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', r2}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'ip6gre0\x00', {0x2, 0x4e21, @rand_addr=0x2}}) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) [ 1273.271862] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1273.433083] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:56 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1274.093985] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1275.167945] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9039e71c54c4000000000000040"], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:58 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:58 executing program 2: r0 = socket(0x2, 0x1, 0x0) listen(r0, 0x0) r1 = epoll_create1(0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000000c0)=""/142) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000009ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 03:42:58 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:58 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4200, r0, 0x0, 0x0) tkill(r0, 0x22) clock_gettime(0x7, &(0x7f0000000140)) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2000, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000100)) 03:42:58 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:42:58 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() keyctl$chown(0x4, r1, r2, r3) 03:42:58 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/full\x00', 0x4000, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000001600)={0x2, 0x0, @initdev}, &(0x7f0000001640)=0x10) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001680)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) poll(&(0x7f00000016c0)=[{r0, 0x2a}, {r1, 0x10}, {r2, 0x2a}], 0x3, 0x9) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) getsockopt$packet_buf(r3, 0x107, 0x1, 0x0, &(0x7f0000000080)=0xfffffffffffffe92) mkdir(&(0x7f0000000040)='./file0\x00', 0x10082) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') prctl$PR_GET_NAME(0x10, &(0x7f0000000480)=""/4096) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x22) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000100)={0x200, 0xffffffffffffffff}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1276.248550] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1276.373916] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1276.397551] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1276.454230] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d615e650000216b69670001eb57dd4df9710000010000030000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d977878b9ee909961f447585b306ba400d8db39450fda633fbe60bb4d01b8d805546f2a63d727e67f23f4a2451e06092e341b0b064d2d91f45f43f26a75eb43b4b81f5cfd3"], 0x1) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@remote, @empty}, &(0x7f0000000040)=0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:42:59 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1276.705175] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1276.744446] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1276.973610] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:59 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:42:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000183b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 1277.228552] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:42:59 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1277.298091] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:00 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1277.724988] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:00 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:00 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1277.868516] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:00 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000380)='TRUE', 0x4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1278.110040] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1278.140453] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1278.334361] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:01 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0x10, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) 03:43:01 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() keyctl$chown(0x4, r1, r2, r3) 03:43:01 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpu.stat\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000740)='/dev/input/mice\x00', 0x0, 0x412042) r1 = accept4$inet(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x20000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000480)=0xc) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x2000, &(0x7f00000004c0)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0xde}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x4}}], [{@euid_eq={'euid', 0x3d, r3}}, {@uid_lt={'uid<', r4}}, {@measure='measure'}, {@permit_directio='permit_directio'}]}) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:01 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:01 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1279.318391] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:02 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x240a01, 0x10) sendmmsg$inet6(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="9bee7cf5f4414e5bcb71f664042a9d61c46cc4b9af3f2954801ecc7fb1db443e8993e4d16850e6c32b7cf48c737e540c7909ddd8608670a609cf5f64eff08896d8521f55eba9984eafe354dfd7c3021af4f7cc0652e226fc7fdc3df5d5f61eb45d3498dd175a1011d4c5d79bcca1ba94c831de1c672763dafe654de941c6130ed80dabc3e9e120f730c6780feea18b228b15925c8e41ee0fc366403ef653fb0fd11198c3553115608787a742fa3afb60cc3f3626b1b293cf57ef81fb38dd550aa63fff9048ed93", 0xc7}, {&(0x7f0000000200)="ab71880cebb5d5d0ec83043fcfe00c2da4283a55bbabcd8bbd608e9c9db202b6af9d26149ac26d8db23df8cdf920a6", 0x2f}, {&(0x7f0000000240)="a6e976e09cf5fc846e144ed9fffc19413003746f33f9b7b0938c", 0x1a}, {&(0x7f0000000280)="69166305c51e13dcb03881cbf3c263", 0xf}, {&(0x7f0000000480)="fd916a52ed649181d8b8ddb52b304366d5d7202f0cc25c9ee512c4283bd593c9c85bcf3506cea023a6f6b899e1140351fee7e1f7d2a9955b166a8beee650dcb4ebeed2465c1e1310d9d26e90e5533aae894e46751ad1712688b0888198b9700a10736aceb12d69cefa", 0x69}, {&(0x7f0000000500)="dd1f25f028a3eafb7e280aba1c13a0ff85e46d133e38", 0x16}, {&(0x7f0000000540)}, {&(0x7f0000000580)="61efcb1c56bb9edbb859db4dae6263c81c35a20708bfa93815274ae3a63122c5e51b13185dc5245306c82a1a4bf068", 0x2f}], 0x8}}], 0x1, 0x1) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1279.373573] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1279.488481] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1279.489337] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1279.542918] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0x6, 0x4]) clone(0x800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:02 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100)="22e381a7df2a550be0ea463162eb0d2f1643b075ce4cffad9d32e4d06f876e4bfcaee6febeb3bab6295c315f604dfde5b94a3893b57da0ebec6f6fee5bc70fb70251b0481144b489f7a937b4bdf18ce8cf7fe1c65b75ce7083cf0c53178fcb4e58a13a73d88696d0f44a9517e8441465520b6855298543bc3f6e4e0b5593e06f041d5b66c63310cfef03e5792ab932bc6247c62207a352ee23af49870f212e8a6819d5fa01fb00a7044dbfbaa36097c5c07404c7eba605ef76f4110cfe3a9c7f612263e83457c0c9c8ccd947bbffdcf11b9239a859146f15df40803043997c056e0c937adb3b59bbb3dce5aec73b0b49243e3442a853", 0xf6, 0x4, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) write(r0, 0x0, 0x121) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0xaf875f9f68c2cbb2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000240)=0x2, 0x4) 03:43:02 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:02 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x22) tkill(r1, 0x9) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:02 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1280.121991] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1280.249964] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:03 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xfffffffffffffd2a, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1280.501830] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:04 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) wait4(r0, &(0x7f0000000040), 0x4, &(0x7f0000000100)) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:04 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() keyctl$chown(0x4, r1, r2, r3) 03:43:04 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r5 = socket(0x6, 0x800, 0x6) socketpair(0x11, 0x803, 0x8, &(0x7f0000000140)={0xffffffffffffffff}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x426080, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x200001, 0x0) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) r10 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r11 = dup3(r0, r10, 0x80000) r12 = accept4(r1, &(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x80, 0x800) r13 = accept(r0, 0x0, &(0x7f0000000500)) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00002dbd7000ffdbdf25030000000c0005000a000000000000000c00040001000000000000004c00070008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="080041eb85cebfebaf370b7700", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r13], 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x4001) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) rmdir(&(0x7f0000000640)='./file0\x00') tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:04 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040003fa03ea504dc5e81ab44ac46"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:04 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1282.334639] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:05 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1282.513256] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000000)=0x7, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f3ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:05 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1282.695405] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1282.971801] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:05 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x100, 0x0) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:05 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:05 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:05 executing program 0: getuid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x20) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000040)=0x5) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000240)=0x34) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) fstat(r1, &(0x7f00000000c0)) tkill(r3, 0x3c) [ 1283.271412] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1283.306876] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1283.367306] audit: type=1400 audit(2000000585.993:131): avc: denied { create } for pid=24920 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1283.461917] audit: type=1400 audit(2000000586.093:132): avc: denied { write } for pid=24920 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1283.534538] audit: type=1400 audit(2000000586.153:133): avc: denied { read } for pid=24920 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1283.643242] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:08 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() keyctl$chown(0x4, r1, r2, r3) 03:43:08 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:08 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:08 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:08 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1285.449291] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:08 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50001000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4004001}, 0x8800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f0000000480)={0x138, r4, 0x502, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x101}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xf5a0, @ipv4={[], [], @rand_addr=0x2}, 0xffffffff7fffffff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x18}, 0xfc}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8, @ipv4={[], [], @loopback}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x6a, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}}}}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x4040000}, 0x10) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1285.500464] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1285.548295] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1285.624107] audit: type=1400 audit(2000000588.253:134): avc: denied { create } for pid=24957 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1285.653940] audit: type=1400 audit(2000000588.283:135): avc: denied { write } for pid=24957 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1285.709960] audit: type=1400 audit(2000000588.343:136): avc: denied { create } for pid=24957 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1285.774044] audit: type=1400 audit(2000000588.403:137): avc: denied { read } for pid=24957 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:08 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000500)={0x8, 0x7, 0x200, 0x8d0d, 0x10001, 0x5}) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) utimensat(r2, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x0) wait4(r1, &(0x7f0000000040), 0x40000000, &(0x7f0000000180)) mkdir(&(0x7f0000000280)='./file1\x00', 0x74) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000100)={0x100000001, {0x14000000, 0x4161, 0xe98, 0x1, 0x100000001, 0x3}}) tkill(r1, 0x22) times(&(0x7f0000000540)) mkdir(&(0x7f0000000580)='./file1\x00', 0x20) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1285.778812] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:08 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000100)) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1285.985970] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:08 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = request_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='cgroup2\x00', 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='cgroup2\x00', 0xfffffffffffffff9) keyctl$reject(0x13, r1, 0x8, 0x40, r2) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:08 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:08 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000100)={0x0, 0x7fffffff, 0x9, 0x8, 0x9}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000000980)=@generic, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000a00)=""/159, 0x9f}, {&(0x7f0000000ac0)=""/15, 0xf}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/106, 0x6a}], 0x4, &(0x7f0000001bc0)=""/4096, 0x1000}, 0xfffffffffffffeff}, {{&(0x7f0000002bc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002c40)=""/210, 0xd2}, {&(0x7f0000002d40)=""/36, 0x24}, {&(0x7f0000002d80)=""/114, 0x72}, {&(0x7f0000002e00)=""/238, 0xee}], 0x4, &(0x7f0000002f40)=""/127, 0x7f}, 0x48e}, {{&(0x7f0000002fc0)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000005540)=[{&(0x7f0000003040)=""/24, 0x18}, {&(0x7f0000003080)=""/236, 0xec}, {&(0x7f0000003180)=""/236, 0xec}, {&(0x7f0000003280)=""/37, 0x25}, {&(0x7f00000032c0)=""/129, 0x81}, {&(0x7f0000003380)=""/111, 0x6f}, {&(0x7f0000003400)=""/4096, 0x1000}, {&(0x7f0000004400)=""/4096, 0x1000}, {&(0x7f0000005400)=""/64, 0x40}, {&(0x7f0000005440)=""/230, 0xe6}], 0xa, &(0x7f0000005600)=""/165, 0xa5}, 0x6}, {{&(0x7f00000056c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006a40)=[{&(0x7f0000005740)=""/133, 0x85}, {&(0x7f0000005800)=""/157, 0x9d}, {&(0x7f00000058c0)=""/83, 0x53}, {&(0x7f0000005940)=""/242, 0xf2}, {&(0x7f0000005a40)=""/4096, 0x1000}], 0x5, &(0x7f0000006ac0)=""/34, 0x22}, 0x6}, {{&(0x7f0000006b00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006b80)=""/23, 0x17}, {&(0x7f0000006bc0)=""/80, 0x50}, {&(0x7f0000006c40)=""/114, 0x72}, {&(0x7f0000006cc0)=""/219, 0xdb}, {&(0x7f0000006dc0)=""/216, 0xd8}, {&(0x7f0000006ec0)=""/128, 0x80}], 0x6, &(0x7f0000006fc0)=""/197, 0xc5}, 0x37}, {{&(0x7f00000070c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007140)=""/132, 0x84}, {&(0x7f0000007200)=""/100, 0x64}, {&(0x7f0000007280)=""/142, 0x8e}, {&(0x7f0000007340)=""/247, 0xf7}], 0x4, &(0x7f0000007480)=""/163, 0xa3}, 0x6}, {{&(0x7f0000007540)=@nl, 0x80, &(0x7f0000007740)=[{&(0x7f00000075c0)=""/83, 0x53}, {&(0x7f0000007640)=""/83, 0x53}, {&(0x7f00000076c0)=""/99, 0x63}], 0x3, &(0x7f0000007780)=""/63, 0x3f}, 0x1000000000000000}], 0x7, 0x40012121, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007a80)=0xe8) sendmsg$inet(r0, &(0x7f0000007b80)={&(0x7f0000000140)={0x2, 0x4e23, @rand_addr=0x10000}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000180)="5a95c46c782c8cf1aac208ca6ef637fc3b104d68e8a4a9b632901216003b5c582733758e9a275a3efa0f5b7d737a96a002b9a3ecac6d5d28756dc5af0fc7ddb12dc5a02ac7e99dc46833785a143162eeac3f4f035e6d1d01", 0x58}, {&(0x7f0000000200)="1e1c1440b6e527424efbbd843aa242e1b92fc5ba3368effdea41bb2499301d9596b6da54382135f9162e04ac6fc58f1fb4179c4de43636c98ce066e43deec75d1a5804fbd654c5ba5e02982be34d0bce50cdb06f7c8671e91a79fa4a894018909ae6965acfe9490006d94a50d3d390bd5e443856ef8b77ff2deaa10ca440020c3a60283317f1966491c572ec349d5efacd7459a394385ae4f39d55aed271d3b0ffeaf7d54d3be658e04a3bc7871ca459e4d351", 0xb3}, {&(0x7f0000000480)="62dd3c5e6450b7326713f99afbcf8be38aaa9db45bc3ab9c8381e6fa3db56ae8ca0d14027779d9708d58c5409b17a98a3b61889d424b604ba99580b9b1d58c46", 0x40}, {&(0x7f00000004c0)="2fc9c4318bad9ca56057a841069eadd6a530f6c08d0cd417cc7d5e5a0005ad03d00c14c1216f9abd77820e2d1406edc09c09c43270afd209c2b0b8865b80a260339b3e56fa9a911dd16b5c8cba2b3d8942ae4c71684432ef7ccf13c19555f2c8f9a314776b0e960558fe5cfa2132419afbf5e0de9d6ac1bff8bf869f2b0988ace4465d280b7b4a7f620de0a690a173d2aa53e0550ebc10bf7234a6466cd4688b1a8a8ff4e2c7309ee17a3e572ae4cce2", 0xb0}, {&(0x7f0000000580)="93dd7ddfe00dd8d24f545228ec04ed89b52d5d506da234f9e2688b6aeed1ef93ab9189702680c7d4e03acff877cf319919af501b9bad95ed6eba2437fa2662fcaed151a5723a7e5da1dc60cf1f7ba193a5164cba95e16f092f210bdbebddbcbb6ef494780a9c9854e4515307957a4ee72950a023d55228d6868d7693482b2b4b0fd07cec0d370d2210e6b8f2992ef932399f365fe1d0a062e64bfbaa6a49d15fa78973f4a54f335a08cb092e9bf65faf68c81b624f03bc85f8e8d8a3ee857ddeb7ba4cc8c5ca1232c4e91e1d83551f8e11fc3200789a4cf8a8", 0xd9}, {&(0x7f0000000680)="b7b091b523b72b30611baff116dd592d54398f91cf1d6cd769c46e0afb0c26", 0x1f}, {&(0x7f00000006c0)="456ddd00b118fd4e50f7c5c913fe46dd65c619ab6e17c57667a7bb995559013654c15c", 0x23}, {&(0x7f0000000700)="95a6f923845a68b9548fdd94d3ad9ec4d14fb3dfc6769f61bdeabc663777aa1e90f5512a25c89e18d44fd4346e828250906910cc988735401a5b4328b04a70318ee6148c4991fe4739502e73edd6078d12066c23376ffcf1bcf13df984add1861e120893be519b8a96bfa505bb9c29422ca94fb6ad4b484090dc7a5a7de335b61892a62da855bfacd9330e03ea54261954fdf87460a679e0d4cced1f3d759c332fcc621686fe96db74fb993eff2654093f47d93f46cbd7dfba8c1a", 0xbb}, {&(0x7f00000007c0)="cf3cc32952d3532878865352eee8b0be484901cd773cac421ae26f038600f9134f5c5338d72fa050feee2c0e38bdd8ec96b670fbaa4a18f80aadfa3bbe4463846d2e1084fd07d3c521013e48947dcdd890691ea386a0b325ce3b63a87033a38fbe5e3705f6fa4b9ade2b7b487ab048fea848ff0b34a9540a95813311286812ec61625e683c5f21ebaf224507e4f8550d9bded3c2e0f6f4d5fced1929e3d90577462e0edadb4c5e076774c0ed8a57a9d4c86d33b300764de38895b0f8bc53d60d42", 0xc1}], 0x9, &(0x7f0000007ac0)=[@ip_retopts={{0x38, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0xfffffffffffffffa, [@multicast2]}, @ssrr={0x89, 0x17, 0xbe, [@local, @broadcast, @multicast2, @local, @multicast2]}, @end, @noop, @ra={0x94, 0x6, 0x80000001}, @noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @dev={0xac, 0x14, 0x14, 0x28}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x35cf7b1c}}], 0xc0}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000007bc0)='/selinux/validatetrans\x00', 0x1, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1286.120282] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1286.238201] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1286.300354] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1286.462919] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1286.560331] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1286.783232] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e675e65004f1a000000291b526bb595f901cf65922d0720e05632970ad6c6e079f879e402a5000000004000001f0010000600f7ff9f05000058014f9f06a30000002200002800d0d9037f607fd49952e28803d54000306b9d267c28d407fcb86317188d91dc7a76b1122777716311738e3e9128851f6f62cbf229fccd04f01b7ee3fb3f035ee581880b697fd36cad3874e08f854a8d00da4946f5d1260a67a7d9b459a90c791c879d6329"], 0x1) ptrace$setopts(0x4200, r2, 0x9, 0x100000000) wait4(0x0, 0x0, 0x176326406e5f5604, 0x0) tkill(r2, 0x3c) 03:43:12 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x101) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:12 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:12 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:12 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getegid() 03:43:12 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000100)={{0xff, @rand_addr=0x1f, 0x4e21, 0x2, 'nq\x00', 0x10, 0x101, 0x50}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x0, 0x1, 0x3, 0x7ff}}, 0x44) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:12 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = geteuid() r1 = request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='cgroup2\x00', 0xffffffffffffffff) keyctl$get_persistent(0x16, r0, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'\x00', 0x4fff}) write$tun(r3, &(0x7f00000017c0)={@val, @val={0x0, 0x3, 0x0, 0x0, 0x8}, @llc={@snap={0x0, 0x0, "f0f6", "f77085", 0x890d}}}, 0x17) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) r6 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x400, &(0x7f0000000100)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:12 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getegid() [ 1289.782985] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:12 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') socket$inet(0x2, 0x4000000000000001, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1289.846062] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1289.951413] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1290.000023] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1290.013568] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1290.026170] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 03:43:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000180)=ANY=[@ANYBLOB="02000000090b00603bdeb180940000000002000000000000000300000000000000000008000000005f73c750c78aaed0740000080407c800000000000000000000e2dd691279cef9b6000000000000000000000000000000000000000000000000000069060000000000008000000000000000c4000000000000000507070300000000000000000000e600"/155]) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:12 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x84714bbbab9c296e, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1290.096907] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1290.141227] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:12 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, 0x0, 0x20e) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0xfffffffffffffe00) [ 1290.158950] syz-executor.0: vmalloc: allocation failure: 11073720804 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 1290.158961] CPU: 0 PID: 25011 Comm: syz-executor.0 Not tainted 4.9.189+ #21 [ 1290.158986] ffff88018cba78c8 ffffffff81b65c01 1ffff10031974f1b ffff8801b078af80 [ 1290.158999] ffffffff82aab2a0 0000000000000001 0000000000400000 ffff88018cba79f0 [ 1290.159013] ffffffff81507d73 0000000041b58ab3 ffffffff82e3b1e8 ffffffff81431920 [ 1290.159017] Call Trace: [ 1290.159038] [<000000003dca2a8a>] dump_stack+0xc1/0x120 [ 1290.159055] [<0000000048f52365>] warn_alloc.cold+0x76/0x93 [ 1290.159070] [<000000000568cbf4>] ? zone_watermark_ok_safe+0x260/0x260 [ 1290.159084] [<000000000bc6d3d2>] ? save_stack_trace+0x16/0x20 [ 1290.159099] [<000000006bba15a6>] ? kasan_kmalloc.part.0+0x62/0xf0 [ 1290.159110] [<00000000e1041dd1>] ? kasan_kmalloc+0xb7/0xd0 [ 1290.159120] [<00000000ca92f40f>] ? __kmalloc+0x133/0x320 [ 1290.159134] [<0000000018e68c24>] ? xt_alloc_table_info+0x6f/0x100 [ 1290.159146] [<000000001dc8e73f>] ? do_ip6t_set_ctl+0x231/0x480 03:43:12 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x20000, 0x0) accept4$inet(r0, 0x0, 0x0, 0x80800) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) clock_gettime(0x0, &(0x7f0000000880)) nanosleep(&(0x7f00000008c0), 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000540)=""/162) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f0000000140)=@generic={0x5, "534f20a0374f5ddc362bd3296bda3ee67c13f7504ec792d8eabc48c93fccc91ec9ee2737f2d5a34577f6b2f9a2320acfb0cf520709191de0ed1dd24a687772277ca9dca2f32954f7a54c8f22bf2eb568a9eaa6dd410ce5322d7b71ae6d24182c66c27609ec78a62230de96d71d32436690a09a39b0ccc7474e02c01c5e94"}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000001c0)="d1d8432e06e836f0f537449bd6f5f3", 0xf}, {&(0x7f0000000200)="b80b519619b28fb1acdc73b4326cf9da95e3ab4dbe1900e6121c47ab4625401fb9bd4d85d7d46c5bdac861b2f860748599fbdbdc12600002a130d6c6f02de228843f4be1ae1e2797001705c7bb32e33e9188836fa0a131b45c5fe96fe409c9872a08ad2ffc3127673a0144257a58b348c9ad9113a986e8ec04923dcee22d1c4d4d2d857821c31130576ce770a3958c94d18e82c84f21926eab8eef64969c7ba0dae38c318dc3e1ed468dcd44ebda6ad723378aa8", 0xb4}, {&(0x7f0000000480)="937891a2f74afe5bda1eca0da61cc9d12c7e2bc0aa888394a16708d965801cdd68cd1deddca9c8d703440024b07525475fbe74dd82821db03cc7e9a38314846f31096b4e2ff7018755d131469c030599dd0a50096f8012fd3daea636b2dd5eb402ce209878f0d596de476e11480d35b5f34aa94b7adb1b936f8ec6ab8d9d0e9029971cb6fa3e204b08c241f38b091820cef232d3df815469f7bc63d15935484b41501386", 0xa4}, {&(0x7f0000000600)="684a961d77497c2d51c81ee16523b3a6df01a88509293e850562524d82dc4bca2eafc8865410187f776cade41a1db6a1b6a38f5189a493d98d052594da57ad77267dfc086be2964df9616cb939b9a6f629d7a8079a859ab5f2522e54d2b7b8e4578f5bfba9e9a531ed833f13e5f118", 0x6f}, {&(0x7f0000000680)="38fa0038794534ab6b65a8d4a1d9d15c333ff395ae4a5ca932ece7db03e1baaca78a771b636ec7796a8e24add58926c95aa8d6c0555fede6a331e7f80b99f4b1a9c9d7922c25c5c89373f9f3155d540a22e0d4b2238cccd91bfa875beefac10e846a9eefdee552e736b13aeb1414cc5f36d515ad4db96d25aae3569c0a0ff88f37c82a2a7bff4f656ac927c745cc0822020df9ea0cc5faf71ec4c8b9e1524afd2e416a36627c1364e566", 0xaa}, {&(0x7f0000000740)="f3c699bef60ae0fdabe0df2ab4007b3cbf50c8aba46367701882199d84aa0b4a98c93ae2da3337c2ba708d1c2b5b968991b5b7057f770c84c70155c056281dc3707e54df563797b6", 0x48}], 0x6}, 0xc0) [ 1290.159158] [<000000001194037d>] ? ipv6_setsockopt+0x10b/0x140 [ 1290.159172] [<00000000d30969a4>] __vmalloc_node_range+0x363/0x610 [ 1290.159190] [<000000000a67a8ce>] ? rcu_read_lock_sched_held+0x10b/0x130 03:43:13 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$setregs(0xf, r1, 0x3f, &(0x7f0000000040)="0737d30f883f614a00e45154edf9") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1290.159201] [<00000000cf178d05>] vmalloc+0x5c/0x70 [ 1290.159215] [<00000000b0c0a2b0>] ? xt_alloc_entry_offsets+0x44/0x50 [ 1290.159230] [<00000000b0c0a2b0>] xt_alloc_entry_offsets+0x44/0x50 [ 1290.159241] [<0000000015d18603>] translate_table+0x215/0x16c0 [ 1290.159252] [<0000000030047088>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1290.159262] [<00000000080eb7bf>] ? compat_do_ip6t_get_ctl+0x910/0x910 [ 1290.159273] [<000000000616f9d4>] ? __check_object_size+0x252/0x38c [ 1290.159281] [<000000009d11072a>] do_ip6t_set_ctl+0x2d4/0x480 [ 1290.159290] [<00000000525f9131>] ? compat_do_ip6t_set_ctl+0x150/0x150 [ 1290.159298] [<0000000079e14e52>] ? mutex_unlock+0x9/0x10 [ 1290.159309] [<00000000af01ad88>] ? nf_sockopt_find.constprop.0+0x1b7/0x230 [ 1290.159318] [<00000000df215f7f>] nf_setsockopt+0x6d/0xc0 [ 1290.159327] [<000000001194037d>] ipv6_setsockopt+0x10b/0x140 03:43:13 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000001a80)=0xe8) getresgid(&(0x7f0000001ac0), &(0x7f0000001b00), &(0x7f0000001b40)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b80)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) fstat(r0, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001d40)={0x0, 0x0}, &(0x7f0000001d80)=0xc) getresgid(&(0x7f0000001dc0), &(0x7f0000001e00)=0x0, &(0x7f0000001e40)) lstat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000002900)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000180)="1b14142645115b1434bc08c4519448da582932bdea7690f9134d9d9164cac17d652d2f15dc5ab57338a8da4309b6c839c0d748c0c7c818b73cb88f7830916b4089786b17705e0e30e068c6dc62555f6a84a7ef8ed478fbe0af3e9b88c813099e2f6c8091e7754b70632c5fb48f869db43468800efcc0a1a3a0b406f1dc4cd57dc8f33ad59020362679dbc4a27227d9e87f751dbc236f7ad64fc5173e1bf5a891fd28d2e6fbcbd5309a", 0xa9}, {&(0x7f0000000480)="d8c7d4616306fb89909c20f2aa83c38fab6aab56989e90afa226c071daf774a2562a9c2bb956bad0978962d9ef8cf4dfcebc46aacef686db7d327a5e37411d2c10ad0e7cefe9398fa8bda99c28be5b480732fb0591f49f2baa2686dee4da12dd73a69086c47e82dca0afa080c109462f8dab3c1e9bae8920a38da778f21ee792420e93980f9152f4dd70ceaf674e062e4d2c979debe363149ae2c3a0122ab35086b5fc0a2f685ebeffa710481cf57d933c982b7418d2615cb37e5b527db94e9417ffdb33c9aa6cd0f6523e7337a8f968d69293979e", 0xd5}, {&(0x7f0000000240)="061a84695c820650ef0b8d40b32b704d397687c3d1c2ce8b3b311de4c97d20fd9c4e247a518b856706c6990bf96e415400984f803ce5313210bba1079926c06b17acc87c8833157947b0e923631d669205637ce88e9d68f2f73680d3c37017d8fdeafcdc25fef820010ba956fd3d85a4cc93b05c26567555afe9", 0x7a}, {&(0x7f0000000580)="ec74b01bc0117ee891edc9ebf3e9034847355832e248d65b5d5a947103da4c8ba3c3deeaa7e773904949a77a8e908d7388a77c861cd3d1aae9855ca5bdc6038c6a8ea538d1c4ec32def905ea5f28ddf2bae558ae91eb9ad235f1b157955f171f448fa3cf5bbb440424b9ce278572849e4b8f4bd244786f9f1b4ab35fd87d4160f8bf492bacc6771b12ec021f9fcb536ee701f5421fd1c122ebfa37e15b4b", 0x9e}, {&(0x7f0000000640)="42e1ac48a6672c989e30e09a9ba18cb80bf575982fd3b9ed144e7a1065c8", 0x1e}, {&(0x7f0000000680)="29c94b09b3ac9b99c1b9ad6fd5701934bc2cb85069308e25f2c51c2eb2179df3f6b23c89f5c3533fda1ad11fff49e02c3b4877c04ba23c3d1415a99ca77ecf248070a2c34af68f2c4e1c834ace889975044d3cb2bb02ab209834974a82a1d8f7d87ef35322ced000b1be0e2e93a246735a674d81d6ff84291764c0385e84fa6424ae017a0a12c7169609b439b6ecc5fa3763e16eecab8e270137e565bad291e58f7f346fd074e5136457e81c2495a1212f526fdb7d4d4b54477a63a30e32276b33d97abd6a8d87ad8cc2f2718cd2b3ed9db9fa5c2ec52140392fb63cb637d2fc9bd806bfe4ecd63c81edde667b7f17dd4188bc90c25caa2bdbc90b0fb474ed", 0xff}], 0x6, &(0x7f0000000800), 0x0, 0x10}, {&(0x7f0000000840)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001940)=[{&(0x7f00000008c0)="08bf415ca50370534d450d169e943bd7b122aceb36de15fd525ce1de88eb2c6c39005bb792df7a0c37b5e87d6addc88a6cf212d728a444daaeb59515bf242419bf22ff3027c23c09bd8be3f448058cb115b83bef172467491dbbad9f076afc3bfbdbe2c036c3f7e73ee1f103ba1e7144642aa7d5f8a42b220e1636", 0x7b}, {&(0x7f0000000940)="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", 0x1000}], 0x2, &(0x7f0000002a00)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="000000001c00000000000014920427fef38a8d26000100000002000000", @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="000000001c000006000000ff0000000002000000", @ANYRES32=r1, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0], 0xb0}, {&(0x7f00000020c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002440)=[{&(0x7f0000002140)="fed9c0d92e82c9c7eddfde64aa5fa0f1ae17cf0d38ff458fb9e711f981b347686ff9089cf5b2fe", 0x27}, {&(0x7f0000002180)="e9302f4dc8b9dfe72ae1d122bb61351d644bb7c707", 0x15}, {&(0x7f00000021c0)="c650463e21fe0d7060deb0a221dcf537533c72f51411521f3eeaaad9a33c04bac67c3b309fc5101ad9d5b4115b75a31044385131abe62303a16080871cc3e5d1fa67b96cc67b05e667824531096310119c081b1420a90978d443a407d135fcf689700dfbac00a665ee97e13ea96aecb28569670ae7eba1d6803323912fea38b0b6258feea499680933dc9ad723165fc5005d44a302e437cf004a7568b33a76873ec4930e6bdd90cf0a175c3970d426a9fdd47c111fd8cd6cccc42dc721533a3fb05a06765a4488e834df9ac63effa13e6201ffbeccdb87891b9d", 0xda}, {&(0x7f00000022c0)="d4e7772881ffcdb295ad06d666405448d0f94b1c8328212366284b1fede68b9b7f35326c24b900fc98cd32a2e52290f741b3381090a5008ca26298eaeef82b9dbf45af1c89a8e103891e7f8cb961e574c31b3744cc30a92b7a4c082cd87f9cd0ab91479c6a595a478541571af2ec09432b47d646dbc1c10de86912a75a32681e195858c8122f748e0df3f583afd272f33637d71873d8d2582968abd35fb23289284bb0ca441b386f79f07105d17454c0932f1ba1b9fab814", 0xb8}, {&(0x7f0000002380)="c24079c98fb2d727270c550acb6157776dd8fc520c31246740ba18b5767c06a2bf2253b105c84b93cd8470aeacc4527bff806c13a5aa015a1e4ec95ae88f24e410993f54a5cf8678d9686bbb4cdc07b21b73bfad68cd97269d7b92b2203f7f77c2bc1dcd22381757b4ad802240cdb5530504c2ceba7d3675692140c56036e9c0bd632759b8f61a73113e136ec7798141fc954d991c4cd615bd5489ed71bc712f780d6ca8", 0xa4}], 0x5, 0x0, 0x0, 0x4000000}, {&(0x7f00000024c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002880)=[{&(0x7f0000002540)="6e8c15bb7da3a5a3d2baf3e87c050d278c1ae2c01b59c9f158fc54441351ab953a084486e12c32e0", 0x28}, {&(0x7f0000002580)="aef7f1fe5354a478976844428188710ea82c3890e91b75c71e927c92d285589018a5652a825b25c13319dccc260871832c9fc37430422176b3d5d92bbb11e0cd870928aed84db5c4b51de1f43aa061fd1bf17bd1fc358e589a4e9ad3ae22119cfddd5ab780ad3c6df3509858c0aa70626b049586d6", 0x75}, {&(0x7f0000002600)="9f84ac07fc90db72e7de55d6ea308afe90b00f8a8f1ef58da149e1152b31bea0fb0d39811733cbe422f4bce7d070979b0ae81f1da0582965585a357c7511fde0494f029ddec15c056d03c3ff96bc223b821fc34796b861b578472ed9a7fc5ba2952ca6af241fe8c1c68be200e1e1", 0x6e}, {&(0x7f0000002680)="89af468bc663b1359bb4169ecc8ca78522b343b8e9839a1389c36d343d1c0bcea560b8eb4213fd38ca2e35cb84fdd0f2e470711b002441ba3973d5fa4276bd4d60e99784be8f9cbc5f7cab06441c33a99c2c84265970909c84f88c8660b7b083a7cb5ddb8d84d304bee04021b1200dee1ec9b454edd3ea2567a24515186dfdd18abf9fa42277d1302df8fc707a65506458f45a983a73ff15432cbc932b27d6cff7fc1ae0f8e3e8a30c46959003", 0xad}, {&(0x7f0000002740)="9653ceade3cffb56eddcae999cdf6a644e8838028446708e234eda359aca7f2a2fcc2fb6dfacce35dfd20ee5e0cc4abc51011e109d6fc4d30529617a296e437b02978504b38684ed909ee386281e9c704b80abb3e6eda23efd014c2221a7cebf964a6da9b21f1ba84f0fc654b23a54200763b0d80582a0e7ea9f", 0x7a}, {&(0x7f00000027c0)="2b8ec73fd4d9c558ea61e1f5ee026f4ab3012a811ba9ce42477af14ef59b438657313af1068c693eb27718c16da3372127dc4e02661ddc23adb5a3ed308dc78ea43e92b0daab8c640332cbf5bc3494c629b87533614a3dc5fc7b165df78b618be08c904e1d9225fdb38f7695587b57963b996a40251b620abda09fd9b85cffb4a2dbaca922b72cc0c66af2ccba1ee345c89b1e5b8a8d6f0ee0ebecd1bed8e328f479b9ff21375b1421434ee9dacf887107bed0c2878dd9264218d3ca65", 0xbd}], 0x6}], 0x4, 0x4000080) [ 1290.159336] [<000000000436c38c>] tcp_setsockopt+0x8a/0xe0 [ 1290.159346] [<0000000051227559>] sock_common_setsockopt+0x9a/0xe0 [ 1290.159356] [<0000000014de700b>] SyS_setsockopt+0x159/0x240 [ 1290.159365] [<000000006e0c972a>] ? SyS_recv+0x40/0x40 [ 1290.159374] [<0000000044bb1e67>] ? SyS_clock_gettime+0x118/0x1f0 [ 1290.159383] [<000000004dbfacb1>] ? do_syscall_64+0x4a/0x5c0 [ 1290.159392] [<000000006e0c972a>] ? SyS_recv+0x40/0x40 [ 1290.159399] [<000000001cb14d76>] do_syscall_64+0x1ad/0x5c0 [ 1290.159409] [<000000002d147a7a>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1290.159453] Mem-Info: [ 1290.159480] active_anon:114421 inactive_anon:13707 isolated_anon:0 [ 1290.159480] active_file:15170 inactive_file:20302 isolated_file:0 [ 1290.159480] unevictable:0 dirty:114 writeback:0 unstable:0 [ 1290.159480] slab_reclaimable:9090 slab_unreclaimable:78918 [ 1290.159480] mapped:59147 shmem:49 pagetables:35874 bounce:0 [ 1290.159480] free:1262859 free_pcp:506 free_cma:0 [ 1290.159501] Node 0 active_anon:457684kB inactive_anon:54828kB active_file:60680kB inactive_file:81208kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236588kB dirty:456kB writeback:0kB shmem:196kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 1290.159525] DMA32 free:3013444kB min:4696kB low:7712kB high:10728kB active_anon:332kB inactive_anon:8kB active_file:8kB inactive_file:0kB unevictable:0kB writepending:8kB present:3145324kB managed:3020100kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:644kB kernel_stack:96kB pagetables:296kB bounce:0kB free_pcp:1316kB local_pcp:688kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 1290.159557] Normal free:2037992kB min:5580kB low:9168kB high:12756kB active_anon:457352kB inactive_anon:54820kB active_file:60672kB inactive_file:81208kB unevictable:0kB writepending:448kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:36360kB slab_unreclaimable:315028kB kernel_stack:49152kB pagetables:143200kB bounce:0kB free_pcp:708kB local_pcp:276kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 1290.159625] DMA32: 17*4kB (UM) 6*8kB (UM) 1*16kB (M) 8*32kB (UM) 3*64kB (UM) 6*128kB (UM) 4*256kB (UM) 3*512kB (UM) 3*1024kB (UM) 4*2048kB (UM) 732*4096kB (UM) = 3013444kB Normal: 40*4kB (UE) 29*8kB (UE) 34*16kB (UME) 98*32kB (UME) 90*64kB (UME) 82*128kB (UM) 86*256kB (UE) 84*512kB (UM) 63*1024kB (U) 64*2048kB (UM) 429*4096kB (UM) = 2038120kB 35501 total pagecache pages [ 1290.159687] 0 pages in swap cache [ 1290.159691] Swap cache stats: add 0, delete 0, find 0/0 [ 1290.159694] Free swap = 0kB [ 1290.159697] Total swap = 0kB [ 1290.159699] 1965979 pages RAM [ 1290.159701] 0 pages HighMem/MovableOnly [ 1290.159704] 313625 pages reserved [ 1290.345151] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1290.402180] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1290.449591] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1290.594494] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:13 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') socket$inet(0x2, 0x4000000000000001, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:13 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:13 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$setopts(0x4206, r1, 0x4, 0x8) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000180)='cgroup2\x00', &(0x7f0000000480)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe', &(0x7f00000001c0)='loGPL)posix_acl_accessnodev]md5sum\x00'], &(0x7f0000000740)=[&(0x7f00000005c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe', &(0x7f0000000240)='em0em0\x00', &(0x7f0000000280)=':)\x00', &(0x7f0000000700)='cgroup2\x00'], 0x400) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000040), &(0x7f0000000100)=0x4) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) getsockname$unix(r3, &(0x7f0000000780)=@abs, &(0x7f0000000800)=0x6e) [ 1290.833029] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:13 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='cgroup2\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r1, r0, 0x0, 0x120, &(0x7f0000000100)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe', r2}, 0x30) [ 1291.040343] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1291.049167] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1291.102694] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1291.131184] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1291.197858] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1291.271899] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:15 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:43:15 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f00000004c0)='bi~\x96sfm|_iLsc\x00$\x18\xa2\xcc\x97\xf2\xcf5\xc3\nv', 0x0, &(0x7f0000000180)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80000, 0x0) write$P9_RMKDIR(r1, &(0x7f00000002c0)={0x14, 0x49, 0x2, {0xe, 0x4, 0x3}}, 0x14) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:15 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3f) 03:43:15 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='cgroup2\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x120, &(0x7f0000000100)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r1, 0x4) 03:43:15 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') socket$inet(0x2, 0x4000000000000001, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1293.342167] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000b00)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES64=r2, @ANYRESOCT=0x0], @ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR64, @ANYRES16=r2], @ANYBLOB="f7b50591746197be4b6e5392eedfeb8d26", @ANYRESDEC=r1, @ANYRESOCT=r0, @ANYRESDEC=r2], @ANYBLOB="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", @ANYRES64=r2, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC=r1, @ANYRESDEC=r0, @ANYRES16=r1], @ANYRES32=r2, @ANYRESOCT, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRESOCT=r1, @ANYRES64], @ANYPTR, @ANYPTR64], 0xa) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:16 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80800) accept4$inet(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:16 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:16 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:16 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, 0x0, 0xfffffffffffffebe) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r2 = dup3(r0, r0, 0x80000) sendmsg$nl_netfilter(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000114}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x3, 0x1, 0x400, 0x70bd2d, 0x25dfdbfe, {0xf, 0x0, 0x6}, [@generic="5748ecb265a49d4fd5a541b5dfe1fadff5ce0c635eab2874b145108b1e18abfaf448f354be1d685d94ae7ce425b758420b062171f82480ce9c0558e04472e9993723942cbeaa18e8b463b31f24"]}, 0x64}, 0x1, 0x0, 0x0, 0xc000}, 0x20040001) [ 1294.179698] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:16 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1294.227044] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1294.255015] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1294.274944] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:18 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:43:18 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x62b) write$smack_current(r1, &(0x7f0000000180)='cgroup2\x00', 0x8) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50088}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x40) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) ptrace$getsig(0x4202, r3, 0x7, &(0x7f0000000100)) tkill(r3, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:18 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:18 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:18 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x4891000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1295.940358] audit: type=1400 audit(2000000598.573:138): avc: denied { create } for pid=25138 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1295.966697] audit: type=1400 audit(2000000598.593:139): avc: denied { write } for pid=25138 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:18 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x77359400}, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x1ff]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x40}}, 0x40000) ioctl(r0, 0x7, &(0x7f0000000040)) [ 1296.001891] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1296.022353] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1296.132635] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_extract_tcp_res(&(0x7f0000000000), 0x9, 0xfffffffffffffff8) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf656bf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x1, 0x40) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:19 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:19 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$cgroup_pid(r0, &(0x7f0000000080)=r2, 0x12) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:19 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:19 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x20000, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1296.710102] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:19 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000014c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, &(0x7f0000000140)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f0000000180)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$void(r0, 0x5451) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0x7fffffff) [ 1296.761162] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1296.772370] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1296.903646] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1297.016777] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1297.087834] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:21 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 03:43:21 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5j9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2\x80\x00\x00\x00\x00\x00\x00\x00\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x74bc0ec8c0d20c17) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8000, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10, 0x80000) accept4$inet(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:21 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:21 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x7fffe) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x323) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:21 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000040)={0x4, 0x0, 0xffffffff7fffffff, 0xfffffffffffffff7, 0x9, "328a02555450d998ab22740ccdb64af09fbcba", 0x6, 0xcbcc}) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_GET_SECCOMP(0x15) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1298.985708] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1299.032775] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1299.073572] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1299.122612] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1299.138780] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1299.190974] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040344fdcca8c2e4545d8637277bd19a872343a2f79b4d457461243ae89f263dde538a3a532f0327a96564c238222579d5d59b99ef89a0d41ba2ddf62a5386558c63414312e3158149f9091c36dfb82ce4a1d581170ce2e7a7c68d9e20cb30fdcad2bf9b0b84805a6d033d6fc9a7846b5b6d52d4af1f3ce548ee916a0cd79b1aa20b04c8ef12d9a9071f8be385a8cf39cb75cd62199f4dc1189f597a11e7b5b857ad43265878b807d60ed1a1e68a402f74054920414d93d63436e62680441d89273d5231ac04dd3bd0734158e9c6d472ccc72cfec44ac90d19ad077"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:22 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(r0, 0x0, 0x0, 0x7fffe) write(r0, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x323) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:22 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, 0x0) tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)=0x8) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r3, 0x3c) 03:43:22 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, 0x0) tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1299.798161] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0xffffffffffffff26) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d615a003a00404f89b9ebcb6e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'syzkaller0\x00', {0x2, 0x4e22, @multicast1}}) socket$nl_generic(0x10, 0x3, 0x10) wait4(0x0, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x474b81fa2db94858, 0x70bd2c, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1783df7bcd268b6c) tkill(r2, 0x3c) [ 1300.058095] audit: type=1400 audit(2000000602.683:140): avc: denied { create } for pid=25236 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1300.145576] audit: type=1400 audit(2000000602.773:141): avc: denied { create } for pid=25233 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1300.185219] audit: type=1400 audit(2000000602.813:142): avc: denied { write } for pid=25233 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1300.269240] audit: type=1400 audit(2000000602.893:143): avc: denied { read } for pid=25233 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1300.867712] audit: type=1400 audit(2000000603.493:144): avc: denied { create } for pid=25233 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1300.899875] audit: type=1400 audit(2000000603.533:145): avc: denied { create } for pid=25244 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1300.900334] audit: type=1400 audit(2000000603.533:146): avc: denied { write } for pid=25244 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1300.976204] audit: type=1400 audit(2000000603.603:147): avc: denied { read } for pid=25244 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:24 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:43:24 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, 0x0) tkill(0x0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:25 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x3f, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:25 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(r0, 0x0, 0x0, 0x7fffe) write(r0, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x323) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:25 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) r2 = getegid() chown(&(0x7f0000000140)='./file0\x00', r1, r2) r3 = getpid() sched_getattr(r3, &(0x7f0000000040)={0x30}, 0x30, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4200, 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='.\x00', 0x93d223194d67a7d4) lsetxattr$trusted_overlay_opaque(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='trusted.overlay.opaque\x00', &(0x7f0000001540)='y\x00', 0x2, 0x0) write$UHID_INPUT(r4, &(0x7f0000000480)={0x8, "f0565c03fa82bbfd13841d9f83a132937782faf942613995024768283f614717e109d0a75e21f73640dde854b7e65f20d43aecbad6f9e4d9cfcc3cbce1c61477655d2037930991faa7c134deb55973157acb5f523cde3a6d707e8423f8341a72d763d09642438222d9f5f654c29d40d5b3064a36801d68fa152f3b4ccdbd9018a146933214d4c1925624a2b67a475fed5ca3710b37c01e1702e34dfcdff6059b4bc0e8e133ad13003ef4aaba6db6591cd8543bfa800468aefe112d28b9bd74d35e3ee272f3940cb488471c663c678ac006eb263fdd1c2032c5ccbef4bd9a790290fc661526b422602cd53f2120303801699d9e524435438d6dcb1e899e478c5acac947fe92747642362f2e82f7279d20c7f6f3d442325de44a01e4967ad16c9d13f8cfe7dae837e8476957599939007d756936d5f795eed6095838ba4a95780d9b4777c7e99b10993a568c1f53ed0623210934255e9549f1b208a9f7754d1809af1b8d846a185118e9bf925344b1de02801e3a942d4fe0b8c759432cd1b6c351afcdf2b38e5263c2a11963921a24574cec13bdd2030ee1066e71b774cf5dbbeb9d3a9f632d65db9f392e633b87befdb821404cb0748b81b809cb6466d698b2f45100fde71ede59caf91b3f0bb7baa4d47d6a9b515260deb0a2c5e35088886b388fff643f38cd6653bdc722134496332425050933cb71a5c21ce6616aeebafef412476c35476c93f0845a4bbf64ff6139d4c772f67c8fe7d280ac6a452d37155531e0766b4daad3b9d0b76c761bca2f476c7c8a60c2059aadc594a2ca168a1edf0f78b92d2d9aca46ade3b323d17407f74c2b8b27c88e0571b2d760207e7692f6797d0c2fa819935d76cfa72d99a7e08f8ca914d0e5a3ad546052e8d1b58cc8bf0b50c599b525862195afadfb1230d6988c9b87c9ac732b328eddd545582e9cbda90d4b51db940888c8a24f6ccd437336b6fc8ddc4267d34b1ebd515c6fa130d51bf1d68ef3f6ad5bad00202604176e65fa9c367e0487d96ef935680cc948d3451b119daf2513f234d4447c5e98e875c7db010a9b0056e469360ac3020a4a317ee50de63de1de71e3b7c6a0cf2047d6d7484e42ed3aaf1a9201b183057cd8d3bf78b73a668b89446f1a9d12a6acb7f81b40581f53886ddc98868fac291094ccc044d291b115e566c78305b5c3fb4f8c887cadcafd6370273811cc6d526a5ecfd2c194291e9c3fd13ba0e15a58471c9759ed6c514f6205fedd5f5a6622fe0644f4885c91eeb91c8cf5beb8ac810bb5093e294226bc2ea3fb9079cd69f7908a3e72e003637164bc0c66891afd29335e51bec6de33aae72486ba91729ac4b9e54c22514480f7f59480bd0bb010960d4da4b0f4568504ded4ae75b4f02cf1ddc8681e33ed4fc4d068497a875dc782312195bf59d9e3a0bd071a60a68cb84bbb54d313027b653801dbf61d9799454ac0080252bf31be5ac963967bae1b2d7768d33c28d7463560cb937913ad41bd3bbf21ac502a13098cc66a39e635feee9b2e17f0881aa4975820efc19a60a9a3f0c043b9f2c54e055d22baa882ade470a47df9439ecfe9e31269f660ab935d8bd151cc98a499338ba6ad831252e80a2687905c71c93a63d89ffa35becf95cbd181ec2e4eb07013bc54f454c9528a6183c20b299519b6e26f5357f9eaa9732cf13b6c97828b9d6b2b2c006a2ebf3de93a7ca0c555cb3cd30edbc37a81fd8a399f346c9a75d9cb6515669ba3e8e010f381c622d60db001b9ef3b2964f5442462eb3f22b460f4babbb6fb38fc9ad8585da21fb0cede3fcda52abe35c690e203f6f8868f2f8a8a109058a79fd52714dae9f5b5ecf1de1d4496bfb25076be447ccf42328ed63937c40ec43ae8a5027349154d86849267c861c8c32fa0b99f0e2ab15c8683a4dfcc89254097af0459f7a423abae3bf2c29effab8ce73c949d60494eb491eb54d18cec11d71ec28388625d166208a9248b105cd49a1630f1f32deffbb1d23f8978b1215ab7610dd7ce445e41f5e216b9ee928302c4d13a5a1b4c583f247e1298b212c681e0d3c47e31fb75e17e5c993c69431fc789c76bd1a6cea098428298381f43388e2370e0c257e157f05b9e3ab08efe365c54ce832898a698bc748c7c2c1437f228761edf25f46e118e5a7cc9602640f71d2d1bb8446223f25687d67e028ca51d004f11e3bc8121549dbbb26bdc51dbcf91874d3b1f9232c4eb7f030291a2d273c99a9e86feec7335a9c01ffaf6f56c2413d295a2321f8ad010977fa81952c1a144698136ba19459ae3fd18da57b8e147ee5d4273a522f091ea6e6bb63d4582cfbe05554ad2104c7c77c61c64287ca9d32272a3b23c9735a31a5122295674b623656161816ad7282bde96e0e930119256b9b2d851ce712eed0232b626d0abb4e18860e68ce2ddc931c8e4a177563682fbaa9349c9242ac45801b2d02831e00377ab6e374b7e238ed9c720d3df09015aa7112d1da59f91edac297248cc8861ff11f2b048234c7a22071b7f80b61145cb19627ccd17c9cf689b03c9c7134cebc4ac224a2d86e604a00d2dd2279bd4cdc8782bdb128b65b90b5af4d1274de1b51c41e4f823f02400a22546b2a2d91041a38b6205c4037b4211d621e8e2d35bebaf28db0f0b913d0a78e87330484e86581f66cb039f47c69d1d3b93698c4765e2c8729f96fc179bbafdda87a05b5c945b89188f7056cc08178c1bbeaa54f39d5f40b7975c5b48b4afe04bf1a0d6b4901ed67ee694011a207902da87641a84c8fc9bb8965161ddaac6165298b06da9e86fab606d6f9c7b2a432718e559d0f649e32393d2c855cd518687dbbb095cf4b4413cd812c29f293eab13898a995f5c57bb23b45e733af474e3f02ea20b8901bb1be402d5c4eaa33e99d3622b99911869230c4cf935404c49c5444a1a5f63037d900b8c36eab5ff2cb4a43850b06a60bb1705569b9cbbd5e34611fbb6920cd8dbdfeb7995b37b4b89cb995f9ad32ecfed4734cc0280e4eaf8ea549f309db243fa9ce3cd55f7c74ff361fcce6f49af4ada2b761fb5dce65cc8e7f2baf746d5689841b15af9edd21ca9ce7fe95a8aa3edff66ce53b32ef755b87c4c36dcdea44be80a84548a2cff8d673e80f1e27048ef0751c01be867cbbc346514e6d8a03f723caa438a15d8c407ff9b5800c10467abee6b3e6966c2ba6f8b76bf9fde02bef872f3b64506757b9264872aa12ddd32b3696a64a2397343090167d6f11f6a838f6dea11dd6636c40965a2d1f260583159ac70fc6d62bc50cd8008cb9b46cd11e84feb1eb7df43fe64760e1e46fcea8894e48107b7fb6d363422ba8e6b59238f736215bf1784b9425a66d0f33a6efe5e943adbf1de2aded6c8c6acd2b5de1a8a3f15b8619748d098aeb960855869f8b0ff2fbf480618827dad53946f2aa097e58317a3a4a2fbc8684b15d342e68c1e93b61eb58295521cdef71d4cf4c69bfd63b32fa3f2315878317398c9526d1ebfb100369833606395be3d97e026f4212abfcf4827b88b1f87af915951a1a75065e7a454051ce32012f060c2fc76dfa11d61fb067884cedabc8fc28618927e4933f55c58b3aa4ea261be2f4244d31b420392c3d140e94b373a8e638204425e563aef4c8c09a2a82ec8146fd07cf56aa2cd011ac858d06addff387a11a820b1f516c35bcb727ff180351050ebfde9d94f59de3cd520591a799a9774df36431805b87fe72e85c91d8abfadb63e56fe9546f7ff1ab01eddc7a215811561990efe4e7033f36222055acc881ce173feab9fb7ccfc2e8f3b4c7ff0ce81a962f8cdbfda0af7a19b1dfa403eb79d4b9227cff87998f66f960a2f1848cd6767c2b6ab8e99c9cc51fb636ff5b23d62295ded69830ad102ac9c196688582be5b19e94ae963dd1759afbbe466d6805e377794c0c98ee25ce80e5056016d1f32f992e42e5d06a440a6062d5cc37fcd212473ed34e6f5ced7ede67dd08357ba2ef266ec236b58c8af39915925cd2b302f6c2c997ea1bfe96ac2cf6cf93b881f3d0130a287cb66f0978f08507c2362c976ec3f1d047ffb3b30f364e81b88567fbc874d8159e17b7820c48a73ac3928dbca398dcb62863838848edd2406230544ec9135910495fee7751ac8aac8c3f84f3e3021d2d3455cc605882de81d9e59ecbed92f09144a7894061e0af97f247ed2602a464f06426e36a7e59b65a347ff98012041b85623ef6d72d304a88e959f61f952e13956b8aa92308e20a5cfab7c54beb1c8ae245d27bbbd0326ce41f7e0bd6d939460ebf4e2d23558c3d9f614235d051f94bbb3398b681dcec36689bb333afea4ce6220881cdcef73904550724b02e45aa1191406d2e0eedb5779a3d6cca39df870695b657e04b5a3bc0cd1e7b59629450146a3e3a80e63a013113b3b4ca7153931080081ed3d0057f6909d69cf3bc5af5db844e9032a90f67e9f8cf5be7252a0ab9ac31e11a4946de889186facc1c20269c1f147f9d72d4d4f775e990f968be998f4e7aeb2cf09119055b166a3fbc6df4aa3ede296c90bb23f55d735a1bae1cd890d96b9400687d370108b16be1849be1dba70969df6351addf8078bf3ea637505b1a1aa836f6f2dd4f274f8c6f7734f7c72294bafadc176b040fb7c740e12c5e1a3581fd9f77e95f6db864104c8c7f3b3114cd995925c4f0aa38df9ff9d31ce3211bb3ac31adf073f76580e4809b17ac0292b0a24a9a1ff39d734ab9621357a2977a144b3f31ba8acfdd229697b0eb7e1cb42bf42955e555fa073b86813dda0d9c20022d5f4e662007922984a7f90b81d6f6517262dd3167543541d36f050399c82af3aa7eb1877644f22e4bfed74b99ccef62bd6b0de35c70e46339fcc3dfe9bd873a13154a9ecba48a2d6a84ca7cc8c10c05e9f5a5e01721c7924302ad7f5fc5f23d92dd7bc60aa5aee3db55e323f5ee2ff122170db12472c49a3e28851d7897030b8cf1285123ee42b1cd0e07ba9060a479082087a37d8adc67d37f527a5125fb78601b535ef5eddef555932d741df05fdd0b3d005899f660ff51374e31e42c953bb104d87f7b4bdfb7d8200bd737698359aa845ede3afbe0bf760316c92b416e1c5ac6537c2a4f982b0f044d2fe285dd4d90070f63266fee5c2d6c70e9318cdb0359177ee223f45b4a7057d23725c9cfb9b9ae3c3b9d88a2455d349246f2a4df771e405a1735bd5b5af201b4b0142a099822b96c66fe10825ef984de5e522e83474209c648a42a8e5fbd9b9013f353fcc1baf9504cd0df583ef8dcd75e8c49ca2ad8bafa254921f76485005ca35be313826f3bece3b0037509cb0180eedda11f100b6c5deb3ab6f8be675b49acb997ac82a9ffc6fd4899d7d3ab36cca14adfdb8fa6f8b1a1a8d8a146a68fed46248f0325e5f0d777545361381003af0605f75cf4de74ba3859a1a8cce1d5d3300c8b35fe1a1456855ffcc49ef67f575b3252832c8fa1763c2e624b6c2eee370e904ed5281736ddbf813a065f6cf131ac4a1707daed08f16fd1dfd3ffa9baecac1a465a755d7fdc6f8d5cd4fb434373b658407d7cea679faf32020886c6f84b3e48845581c2b8604db4a90715bc055957478f3f55d75473f635dc3318f5a96f5c7a075a777198ef1b43ac6515e0fb759eaf14562921096070536308dde6f1e75934839b3c8db6ec62797e62cbd38b03f66b86d7be0021c36327a231c008a24d19bbcd03dd7c194fba5b1f1a31ba2a3a326a40d2bf98f39e91a2d2c6415775b2956256e4c4854cd9c8c3706ae549540f4c0b16cd960260b6e11d02363c", 0x1000}, 0x1006) tkill(r3, 0x22) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001580)=r4, 0x4) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:25 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) creat(&(0x7f0000000040)='./file0\x00', 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1302.934381] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:25 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x7fffe) write(r0, &(0x7f00000001c0), 0xfffffef3) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1302.977355] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1303.110325] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:25 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x7fffe) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1303.157060] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1303.178972] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:26 executing program 1: pipe(&(0x7f00000004c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1303.354890] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:26 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1303.559146] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:26 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1303.669593] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1303.813367] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1304.593688] lowmemorykiller: Killing 'syz-executor.5' (6514) (tgid 6514), adj 1000, [ 1304.593688] to free 51368kB on behalf of 'syz-executor.0' (25239) because [ 1304.593688] cache 65500kB is below limit 65536kB for oom_score_adj 12 [ 1304.593688] Free memory is -13168kB above reserved [ 1304.644207] lowmemorykiller: Killing 'syz-executor.5' (6545) (tgid 6545), adj 1000, [ 1304.644207] to free 41068kB on behalf of 'kswapd0' (33) because [ 1304.644207] cache 64500kB is below limit 65536kB for oom_score_adj 12 [ 1304.644207] Free memory is -4368kB above reserved [ 1304.644215] BUG: sleeping function called from invalid context at kernel/fork.c:905 [ 1304.644220] in_atomic(): 0, irqs_disabled(): 0, pid: 33, name: kswapd0 [ 1304.644233] 2 locks held by kswapd0/33: [ 1304.644255] #0: (shrinker_rwsem){++++..}, at: [<000000000af27f33>] shrink_slab.part.0+0xb2/0xa20 [ 1304.644270] #1: (rcu_read_lock){......}, at: [<000000009203c250>] lowmem_scan+0x242/0xb50 [ 1304.644279] Preemption disabled at: [ 1304.644280] [<0000000049240585>] get_task_mm+0x20/0xc0 [ 1304.644288] CPU: 1 PID: 33 Comm: kswapd0 Not tainted 4.9.189+ #21 [ 1304.644302] ffff8801d8def7c0 ffffffff81b65c01 0000000000000000 0000000000000001 [ 1304.644313] ffff8801d992c740 ffffffff810d1010 ffff8801d992c740 ffff8801d8def7f8 [ 1304.644322] ffffffff814018f3 ffff8801d992c740 ffffffff82a39fc0 0000000000000389 [ 1304.644324] Call Trace: [ 1304.644335] [<000000003dca2a8a>] dump_stack+0xc1/0x120 [ 1304.644342] [<0000000049240585>] ? get_task_mm+0x20/0xc0 [ 1304.644350] [<000000000bcd6e45>] ___might_sleep.cold+0x1c1/0x1fa [ 1304.644358] [<0000000024ed77bb>] __might_sleep+0x95/0x1a0 [ 1304.644365] [<00000000e344ddc6>] mmput+0x28/0x370 [ 1304.644372] [<00000000c52548f1>] handle_lmk_event+0xea/0x8a0 [ 1304.644379] [<000000004cb82044>] lowmem_scan+0x695/0xb50 [ 1304.644388] [<0000000048e04f93>] shrink_slab.part.0+0x3cf/0xa20 [ 1304.644396] [<000000006c3bccef>] ? unregister_shrinker+0x230/0x230 [ 1304.644405] [<0000000092173451>] ? _raw_spin_unlock_irq+0x39/0x60 [ 1304.644413] [<0000000000911001>] ? finish_task_switch+0x1e5/0x660 [ 1304.644421] [<00000000b6369004>] ? finish_task_switch+0x1b7/0x660 [ 1304.644428] [<000000005ca91d88>] ? __switch_to_asm+0x41/0x70 [ 1304.644436] [<00000000062ccf41>] shrink_node+0x1ed/0x750 [ 1304.644444] [<00000000a3b89b98>] ? shrink_node_memcg.isra.0+0x1360/0x1360 [ 1304.644452] [<00000000ec908325>] kswapd+0x7f8/0x13b0 [ 1304.644460] [<000000009d8a374a>] ? try_to_free_pages+0xbd0/0xbd0 [ 1304.644469] [<0000000097a50315>] ? autoremove_wake_function.part.0+0x130/0x130 [ 1304.644478] [<000000006c2e1c9e>] ? __kthread_parkme+0x173/0x240 [ 1304.644500] [<000000009d8a374a>] ? try_to_free_pages+0xbd0/0xbd0 [ 1304.644507] [<00000000d391f051>] kthread+0x278/0x310 [ 1304.644514] [<0000000002824be0>] ? kthread_park+0xa0/0xa0 [ 1304.644534] [<0000000030047088>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1304.644542] [<0000000092173451>] ? _raw_spin_unlock_irq+0x39/0x60 [ 1304.644563] [<0000000000911001>] ? finish_task_switch+0x1e5/0x660 [ 1304.644571] [<00000000b6369004>] ? finish_task_switch+0x1b7/0x660 [ 1304.644577] [<000000005ca91d88>] ? __switch_to_asm+0x41/0x70 [ 1304.644584] [<000000007d5c6377>] ? __switch_to_asm+0x35/0x70 [ 1304.644591] [<000000005ca91d88>] ? __switch_to_asm+0x41/0x70 [ 1304.644599] [<0000000002824be0>] ? kthread_park+0xa0/0xa0 [ 1304.644607] [<0000000002824be0>] ? kthread_park+0xa0/0xa0 [ 1304.644614] [<000000000b0a06e1>] ret_from_fork+0x5c/0x70 [ 1304.644797] [ 1304.644799] ================================= [ 1304.644800] [ INFO: inconsistent lock state ] [ 1304.644806] 4.9.189+ #21 Tainted: G W [ 1304.644807] --------------------------------- [ 1304.644811] inconsistent {RECLAIM_FS-ON-W} -> {IN-RECLAIM_FS-R} usage. [ 1304.644818] kswapd0/33 [HC0[0]:SC0[0]:HE1:SE1] takes: [ 1304.644831] (&mm->mmap_sem){+++++?}, at: [<000000006f8bf377>] get_cmdline+0xa3/0x2d0 {RECLAIM_FS-ON-W} state was registered at: [ 1304.644841] mark_held_locks+0xb1/0x100 [ 1304.644847] lockdep_trace_alloc+0x18c/0x2b0 [ 1304.644853] __alloc_pages_nodemask+0x143/0x1a80 [ 1304.644860] __pmd_alloc+0x4a/0x330 [ 1304.644867] move_page_tables+0xadb/0xd60 [ 1304.644873] shift_arg_pages+0x1ae/0x470 [ 1304.644878] setup_arg_pages+0x60d/0x7c0 [ 1304.644892] load_elf_binary+0xa84/0x4a90 [ 1304.644898] search_binary_handler+0x14f/0x700 [ 1304.644904] do_execveat_common.isra.0+0xf81/0x1db0 [ 1304.644909] do_execve+0x3a/0x50 [ 1304.644917] run_init_process+0x33/0x37 [ 1304.644924] try_to_run_init_process+0x18/0x48 [ 1304.644931] kernel_init+0xf2/0x163 [ 1304.644936] ret_from_fork+0x5c/0x70 [ 1304.644939] irq event stamp: 150003 [ 1304.644947] hardirqs last enabled at (150003): [<00000000c4a2a729>] dump_stack+0x100/0x120 [ 1304.644954] hardirqs last disabled at (150002): [<00000000ac58c420>] dump_stack+0x2c/0x120 [ 1304.644963] softirqs last enabled at (147784): [<000000007e1e0189>] __do_softirq+0x474/0x964 [ 1304.644971] softirqs last disabled at (147763): [<000000006da0a79f>] irq_exit+0x119/0x160 [ 1304.644973] [ 1304.644973] other info that might help us debug this: [ 1304.644975] Possible unsafe locking scenario: [ 1304.644975] [ 1304.644976] CPU0 [ 1304.644978] ---- [ 1304.644985] lock(&mm->mmap_sem); [ 1304.644986] [ 1304.644990] lock(&mm->mmap_sem); [ 1304.644992] [ 1304.644992] *** DEADLOCK *** [ 1304.644992] [ 1304.644996] 3 locks held by kswapd0/33: [ 1304.645009] #0: (shrinker_rwsem){++++..}, at: [<000000000af27f33>] shrink_slab.part.0+0xb2/0xa20 [ 1304.645022] #1: (rcu_read_lock){......}, at: [<000000009203c250>] lowmem_scan+0x242/0xb50 [ 1304.645035] #2: (lmk_event_lock){+.+.-.}, at: [<000000004a1b23d6>] handle_lmk_event+0xfb/0x8a0 [ 1304.645036] [ 1304.645036] stack backtrace: [ 1304.645043] CPU: 1 PID: 33 Comm: kswapd0 Tainted: G W 4.9.189+ #21 [ 1304.645055] ffff8801d8def500 ffffffff81b65c01 00000000000000f0 ffff8801d992c740 [ 1304.645066] ffffffff83caf7a0 ffff8801d992d088 ffffffff84250fc0 ffff8801d8def578 [ 1304.645076] ffffffff81408330 0000000000000000 ffffffff00000001 0000000000000001 [ 1304.645077] Call Trace: [ 1304.645085] [<000000003dca2a8a>] dump_stack+0xc1/0x120 [ 1304.645094] [<000000008d2d98ca>] print_usage_bug.cold+0x452/0x5a2 [ 1304.645101] [<00000000e87130d6>] mark_lock+0x6c7/0x12e0 [ 1304.645109] [<00000000529dc11e>] ? print_irq_inversion_bug+0xa0/0xa0 [ 1304.645116] [<000000005783d0e4>] __lock_acquire+0x5be/0x4390 [ 1304.645126] [<00000000bcb0f3ef>] ? debug_smp_processor_id+0x1c/0x20 [ 1304.645133] [<000000004dc9cf19>] ? perf_trace_lock+0x11e/0x540 [ 1304.645140] [<00000000f2b7b775>] ? trace_hardirqs_on+0x10/0x10 [ 1304.645148] [<000000003562bb11>] ? get_task_mm+0x9c/0xc0 [ 1304.645155] [<0000000030047088>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1304.645162] [<00000000ee5268ca>] lock_acquire+0x133/0x3d0 [ 1304.645169] [<000000006f8bf377>] ? get_cmdline+0xa3/0x2d0 [ 1304.645175] [<000000004e4a455b>] down_read+0x44/0xb0 [ 1304.645182] [<000000006f8bf377>] ? get_cmdline+0xa3/0x2d0 [ 1304.645188] [<000000006f8bf377>] get_cmdline+0xa3/0x2d0 [ 1304.645196] [<000000006c45771f>] handle_lmk_event+0x13c/0x8a0 [ 1304.645203] [<000000004cb82044>] lowmem_scan+0x695/0xb50 [ 1304.645211] [<0000000048e04f93>] shrink_slab.part.0+0x3cf/0xa20 [ 1304.645220] [<000000006c3bccef>] ? unregister_shrinker+0x230/0x230 [ 1304.645243] [<0000000092173451>] ? _raw_spin_unlock_irq+0x39/0x60 [ 1304.645252] [<0000000000911001>] ? finish_task_switch+0x1e5/0x660 [ 1304.645260] [<00000000b6369004>] ? finish_task_switch+0x1b7/0x660 [ 1304.645267] [<000000005ca91d88>] ? __switch_to_asm+0x41/0x70 [ 1304.645276] [<00000000062ccf41>] shrink_node+0x1ed/0x750 [ 1304.645285] [<00000000a3b89b98>] ? shrink_node_memcg.isra.0+0x1360/0x1360 [ 1304.645293] [<00000000ec908325>] kswapd+0x7f8/0x13b0 [ 1304.645302] [<000000009d8a374a>] ? try_to_free_pages+0xbd0/0xbd0 [ 1304.645311] [<0000000097a50315>] ? autoremove_wake_function.part.0+0x130/0x130 [ 1304.645319] [<000000006c2e1c9e>] ? __kthread_parkme+0x173/0x240 [ 1304.645327] [<000000009d8a374a>] ? try_to_free_pages+0xbd0/0xbd0 [ 1304.645335] [<00000000d391f051>] kthread+0x278/0x310 [ 1304.645343] [<0000000002824be0>] ? kthread_park+0xa0/0xa0 [ 1304.645350] [<0000000030047088>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1304.645359] [<0000000092173451>] ? _raw_spin_unlock_irq+0x39/0x60 [ 1304.645367] [<0000000000911001>] ? finish_task_switch+0x1e5/0x660 [ 1304.645375] [<00000000b6369004>] ? finish_task_switch+0x1b7/0x660 [ 1304.645383] [<000000005ca91d88>] ? __switch_to_asm+0x41/0x70 [ 1304.645390] [<000000007d5c6377>] ? __switch_to_asm+0x35/0x70 [ 1304.645397] [<000000005ca91d88>] ? __switch_to_asm+0x41/0x70 [ 1304.645404] [<0000000002824be0>] ? kthread_park+0xa0/0xa0 [ 1304.645412] [<0000000002824be0>] ? kthread_park+0xa0/0xa0 [ 1304.645420] [<000000000b0a06e1>] ret_from_fork+0x5c/0x70 [ 1304.658652] lowmemorykiller: Killing 'syz-executor.5' (6509) (tgid 6509), adj 1000, [ 1304.658652] to free 40724kB on behalf of 'kswapd0' (33) because [ 1304.658652] cache 64500kB is below limit 65536kB for oom_score_adj 12 [ 1304.658652] Free memory is -4368kB above reserved [ 1304.660825] lowmemorykiller: Killing 'syz-executor.5' (7065) (tgid 7065), adj 1000, [ 1304.660825] to free 36236kB on behalf of 'kswapd0' (33) because [ 1304.660825] cache 64500kB is below limit 65536kB for oom_score_adj 12 [ 1304.660825] Free memory is 1932kB above reserved 03:43:30 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:30 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:43:30 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x3) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:30 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:30 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000100)={0x2, 0x20, 0x1, 0xffffffffffffffff}) ioctl$FICLONE(r2, 0x40049409, r0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) sendto$inet(r0, &(0x7f0000000040)="21822245977783c615fb7dd8c8a000ed703902fc76d7dde70410f374bbbe1a85f180a09af15373d321b382741c60", 0x2e, 0x80, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) 03:43:30 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a300000022000007000000037d71c54c4000000000000040062efb6d91a5fa35f9c0a23ead845a1b10319677d06d00a4192a73a5d3f8ee3ea59578d9b4fc837bf62304902ab5a9d26fe19b44e57ac2250f03fe94a1d22d560751666b90e6ac73bcac7dedcc0bc2f3a3c75a8cafb123d8591ea7ec64d3cee81365daa65707c1661405dd4c7f3be0d8533f936df15d6ce755561cd9bdd3f04ce0dd34a5169add6618791d1e4c5430dc15dcd4334d6c48"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:30 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1307.496094] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:30 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002040)='./file0\x00', 0x58) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000002000)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="4400040008000100ffffffff3f0000fb08000000050040ff9f0b0000070000d4060000000700fbc60600000003000009ff0000000fd702089d000000ff0f0701ff01000014000400284d06014d033133030003050200000008000500", @ANYRES32=r0, @ANYBLOB="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"], 0x1b6c}, 0x1, 0x0, 0x0, 0x80}, 0x1) clone(0x6000700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) sysinfo(&(0x7f0000000100)=""/109) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r2}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f00000001c0)={0x10, 0x0, 0x5}, 0x10) 03:43:30 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:30 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1307.645207] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1307.685273] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1307.716559] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:30 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1307.803121] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1307.887641] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1307.939623] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:30 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1307.980467] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:30 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @mss={0x2, 0x4000000000000}, @timestamp, @mss={0x2, 0x1d6}, @timestamp, @mss={0x2, 0x69c0000000000000}, @timestamp], 0x7) accept4$inet(r0, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x80000) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1308.127348] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1308.207970] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:33 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$cont(0x7, r0, 0x0, 0x0) 03:43:33 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:33 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:33 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr, 0x5}, 0x1c) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x2, 0x5, 0x200, 0x70bd27, 0x25dfdbfc, {0x5, 0x0, 0x1}, [@typed={0x8, 0x3f, @fd=r0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c0}, 0x4044800) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r3, 0x3c) [ 1310.533170] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:33 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') 03:43:33 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) ioprio_get$pid(0x2, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xd1, 0x4, 0x3, "e944ab11f8e763042313fdf8db899d0e", "c82d2bf21b9d784274eae0355fe84a95831936e7285c7fc6afcf323e79220836928d52f71d226b8355535f24df6e1c0364a7a64582e1b7359d3211c44adb22c3ff1aca3554ff21711e4834eaaf5d61d9664bcf6f8c42df9ddfcced528f4f19961a66d10a59e924105f0dbd5e30feef1dd6c54a54cef8d4169c60343917b0dae2be29c48c8fb3fe2b885d62320913a6fe6287dde4397b6c7e458c6d493b223a44fb6a8a48cac49da71ca723aa352c4e6ce04d210377105b5a96a23fb3"}, 0xd1, 0x3) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0xe9) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1f, 0x9, 0x0, 0x0, 0x1a, 0x1, "9d7423f51eeb9bc33cf30f2754bb94158f93068489890d7b55f8aba246706252cef397e91900e735e5b084a708ca937b544778d2941d194468b9384ba7c8c025", "598a4c55a2b0565f7fa042fb1b86204296b77a72cb2f92b962cbf0d2998d0e312b2675d4450c8b6835f65d1b3b5db07920ec59a0764cef7bbde631132b9fbe7e", "33fc79323d398dca3aaa95862c4ce4de54c4898d1219771bfc46989f06d02cfb", [0x5, 0x8]}) tkill(r0, 0xf) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, 0x0, 0x0, r2) 03:43:33 executing program 4: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') tkill(0x0, 0x0) nanosleep(0x0, 0x0) 03:43:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = open(&(0x7f0000000680)='./file0\x00', 0x400, 0x546ff57bd631da67) getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f0000001ac0)=""/4096, &(0x7f00000006c0)=0x1000) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000217e69080000000000000095f901cf65ebf0b5a219c70500000000000000001f00ff00002200001000d0d9037d71c54c4000000000000040"], 0x1) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f00000000c0)) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r3, 0x3c) 03:43:33 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1310.578083] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1310.692351] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1310.718243] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:33 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1310.760247] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:33 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') [ 1310.917691] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:36 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, 0x0) 03:43:36 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$cont(0x7, r0, 0x0, 0x0) 03:43:36 executing program 4: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002040)='./file0\x00', 0x58) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000002000)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="4400040008000100ffffffff3f0000fb08000000050040ff9f0b0000070000d4060000000700fbc60600000003000009ff0000000fd702089d000000ff0f0701ff01000014000400284d06014d033133030003050200000008000500", @ANYRES32=r0, @ANYBLOB="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"], 0x1b6c}, 0x1, 0x0, 0x0, 0x80}, 0x1) clone(0x6000700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) sysinfo(&(0x7f0000000100)=""/109) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r2}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f00000001c0)={0x10, 0x0, 0x5}, 0x10) 03:43:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:36 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) write(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x3) socket$inet_tcp(0x2, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x7df2182c5f1c5def}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:36 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, 0x0) 03:43:36 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2002400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000140)=0x8, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x22) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000480)=""/4096, &(0x7f0000000040)=0x1000) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) 03:43:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x1fc) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 03:43:36 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed5", @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620137d0492482ba837296d961244e2e0c7340575400000093385dfb37b600000000"], 0x0, 0x54}, 0x20) tkill(r0, 0x3b) ptrace$cont(0x7, r0, 0x0, 0x0) 03:43:36 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, 0x0) 03:43:36 executing program 4: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002040)='./file0\x00', 0x58) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000002000)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="4400040008000100ffffffff3f0000fb08000000050040ff9f0b0000070000d4060000000700fbc60600000003000009ff0000000fd702089d000000ff0f0701ff01000014000400284d06014d033133030003050200000008000500", @ANYRES32=r0, @ANYBLOB="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"], 0x1b6c}, 0x1, 0x0, 0x0, 0x80}, 0x1) clone(0x6000700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) sysinfo(&(0x7f0000000100)=""/109) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r2}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f00000001c0)={0x10, 0x0, 0x5}, 0x10) [ 1313.642433] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1313.643483] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) tkill(r2, 0xa) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r3, 0x3c) 03:43:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x1fc) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 1313.782420] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1313.792256] audit: type=1400 audit(2000000616.423:148): avc: denied { create } for pid=25446 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:36 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0xcce5ab2875da84cd, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1, 0x4, 0x7, 0x2c, 0x0, 0x3, 0x808, 0x7, 0x7fffffff, 0x7ff, 0x9, 0x7, 0x5, 0x1, 0x7, 0x5f3f07d3, 0x5, 0x8, 0x9, 0x200, 0x660, 0x40, 0x800, 0x7, 0xaac4, 0x5, 0x80000000, 0x3ff, 0x3ff, 0x2, 0xfffffffffffffffd, 0xb1, 0x8, 0x401, 0x81, 0xa74e, 0x0, 0x5, 0xc83304379c5d129d, @perf_bp={&(0x7f0000000040), 0x5}, 0x7aec24db04df03bc, 0x80000000, 0xac24, 0xf, 0x4}, r0, 0x1, r1, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1313.793267] audit: type=1400 audit(2000000616.423:149): avc: denied { write } for pid=25446 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1313.868523] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x1fc) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e675e650000216b6967000100010000000000181b526bb595f901cf65ebf0b5a219c70500000000000000001f0010000600f7ff9f05000058024f9f80a30000002200001000d0d9037d71c54c4000000000000040"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 1313.915331] audit: type=1400 audit(2000000616.543:150): avc: denied { read } for pid=25446 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1313.997371] audit: type=1400 audit(2000000616.623:151): avc: denied { create } for pid=25446 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:36 executing program 1: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) ioprio_get$pid(0x2, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xd1, 0x4, 0x3, "e944ab11f8e763042313fdf8db899d0e", "c82d2bf21b9d784274eae0355fe84a95831936e7285c7fc6afcf323e79220836928d52f71d226b8355535f24df6e1c0364a7a64582e1b7359d3211c44adb22c3ff1aca3554ff21711e4834eaaf5d61d9664bcf6f8c42df9ddfcced528f4f19961a66d10a59e924105f0dbd5e30feef1dd6c54a54cef8d4169c60343917b0dae2be29c48c8fb3fe2b885d62320913a6fe6287dde4397b6c7e458c6d493b223a44fb6a8a48cac49da71ca723aa352c4e6ce04d210377105b5a96a23fb3"}, 0xd1, 0x3) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0xe9) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1f, 0x9, 0x0, 0x0, 0x1a, 0x1, "9d7423f51eeb9bc33cf30f2754bb94158f93068489890d7b55f8aba246706252cef397e91900e735e5b084a708ca937b544778d2941d194468b9384ba7c8c025", "598a4c55a2b0565f7fa042fb1b86204296b77a72cb2f92b962cbf0d2998d0e312b2675d4450c8b6835f65d1b3b5db07920ec59a0764cef7bbde631132b9fbe7e", "33fc79323d398dca3aaa95862c4ce4de54c4898d1219771bfc46989f06d02cfb", [0x5, 0x8]}) tkill(r0, 0xf) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, 0x0, 0x0, r2) 03:43:36 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r0, 0x0, 0x1b5) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000280)='ext2\x00', 0x41, &(0x7f0000000100)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ptrace$setopts(0x4200, r1, 0x0, 0x8) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1314.035634] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:36 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0xfb07) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f0000000100)=@sr0='/dev/sr0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='openpromfs\x00', 0x4000, &(0x7f00000001c0)='vmnet1}posix_acl_access[%]bdev\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x989680}, 0x0) [ 1314.153709] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1314.225344] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1314.254904] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1314.267594] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:36 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) read$char_usb(r0, &(0x7f0000000100)=""/224, 0xe0) r1 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') write$UHID_INPUT(r0, &(0x7f0000000480)={0x8, "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", 0x1000}, 0x1006) ptrace$setopts(0x4206, r1, 0x0, 0x0) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1314.281923] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1314.327082] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" 03:43:37 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='cgroup2\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xc5\xbf\xfa\xd8\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl>\xc1\xb1\xda\x8b\xd4\x1bh\xb2\xc7\xb1\n@\xc7\xfd\xe9H\xa4\xf9\xcd\tq\x9c\xe7]3A\xca\xf4\xc5\xb1\x83\xce\xf4\xaa<\xb7z!\x1a\xf7\xe4\xe5\xd4?\xf4\xbaQ\xfe') r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) [ 1314.369491] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1314.427218] cgroup: cgroup2: unknown option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" [ 1314.436943] audit: type=1400 audit(2000000617.063:152): avc: denied { create } for pid=25501 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1314.465063] audit: type=1400 audit(2000000617.093:153): avc: denied { getattr } for pid=25501 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1