, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x500], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2d}) 07:39:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0xc0ed0000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x6000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1244.734252] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x4, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100012, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1244.925207] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x6000000000000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x2], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1244.988837] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x6800000000000000}) 07:39:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104009, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1245.223021] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1245.236435] EXT4-fs: 18 callbacks suppressed [ 1245.236446] EXT4-fs (sda1): Cannot specify journal on remount 07:39:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x8cffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x3000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x300000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1245.370243] EXT4-fs (sda1): Cannot specify journal on remount [ 1245.398736] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x3f00000000000000}) 07:39:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x1000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x600], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1245.545563] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c01b, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1245.659044] EXT4-fs (sda1): Cannot specify journal on remount 07:39:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x2200, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1245.707946] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x6], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1245.776744] EXT4-fs (sda1): Cannot specify journal on remount 07:39:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c00d, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1245.925134] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x400000000000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x700}) 07:39:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0xff00000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108016, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1246.128671] EXT4-fs (sda1): Cannot specify journal on remount 07:39:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x300000000000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1246.190353] EXT4-fs (sda1): Cannot specify journal on remount [ 1246.213680] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x6c}) 07:39:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x2000000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c01e, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x6, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1246.489025] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1246.515436] EXT4-fs (sda1): Cannot specify journal on remount 07:39:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x500000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2d00000000000000}) [ 1246.643093] EXT4-fs (sda1): Cannot specify journal on remount [ 1246.681733] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x3000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100060, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:07 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x6000000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1246.900065] EXT4-fs (sda1): Cannot specify journal on remount 07:39:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1246.983394] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1246.992607] EXT4-fs (sda1): Cannot specify journal on remount 07:39:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x2c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:07 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0xfeffff0700000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfdffffff}) 07:39:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x7, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1247.242289] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10000b, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:07 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x90000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x2200000000000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1247.520996] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108007, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfdfdffff}) 07:39:08 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x300], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0xfffffff6, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1247.811850] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x5, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:08 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x90], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108009, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x74000000}) [ 1248.018287] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x2000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:08 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x400000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10800d, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x3f00000000000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1248.315814] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2000000}) 07:39:08 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x7], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x300, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1248.585822] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:08 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x600000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c01d, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x8cffffff00000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:09 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x700000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1248.811380] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x7a}) 07:39:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1248.970416] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0xedc000000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c009, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:09 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x1000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1249.314943] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0xf6ffffff00000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:09 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x9000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104019, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x6b6b6b00}) 07:39:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1249.559667] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x7000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:09 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0xff00], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1249.711065] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xaa0d000000000000}) 07:39:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100005, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:10 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x3], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1249.976050] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x100000000000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:10 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x4], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x400000}) 07:39:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10001e, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0xf6ffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1250.381190] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1250.411744] EXT4-fs: 15 callbacks suppressed [ 1250.411754] EXT4-fs (sda1): Cannot specify journal on remount 07:39:10 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0xffffff7f00000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100015, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1250.540671] EXT4-fs (sda1): Cannot specify journal on remount 07:39:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x60000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1250.656943] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x6000}) 07:39:11 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x100000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1250.806784] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c010, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:11 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x4000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x2c00, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1250.928406] EXT4-fs (sda1): Cannot specify journal on remount [ 1250.994040] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:11 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x5000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1251.079389] EXT4-fs (sda1): Cannot specify journal on remount 07:39:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c016, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xa}) 07:39:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x6000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1251.173178] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:11 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x2000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x600, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1251.383804] EXT4-fs (sda1): Cannot specify journal on remount 07:39:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10801c, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1251.533996] EXT4-fs (sda1): Cannot specify journal on remount [ 1251.653142] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x2000000000000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:12 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x700], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x74}) 07:39:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10400a, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1251.795565] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0xffffffff00000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:12 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x7fffffe], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1251.915660] EXT4-fs (sda1): Cannot specify journal on remount [ 1252.002681] EXT4-fs (sda1): Cannot specify journal on remount 07:39:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x10000000}) [ 1252.043627] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c003, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x500, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:12 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0xffffffff00000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1252.274317] EXT4-fs (sda1): Cannot specify journal on remount 07:39:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0xffffff8c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104012, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xffffff8c}) 07:39:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x22000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10401e, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1252.862800] EXT4-fs (sda1): Cannot specify journal on remount 07:39:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='\nuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x18}) 07:39:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10002d, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1253.231128] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1253.254108] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:13 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x9000000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104011, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='"use\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1253.489041] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1253.504823] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=',use\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x3}) 07:39:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10400f, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1253.729124] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1253.729271] IPVS: ftp: loaded support on port[0] = 21 07:39:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1253.782248] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='.use\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1253.888677] device bridge_slave_1 left promiscuous mode [ 1253.894386] bridge0: port 2(bridge_slave_1) entered disabled state 07:39:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x20000000}) [ 1253.950007] device bridge_slave_0 left promiscuous mode [ 1253.959684] bridge0: port 1(bridge_slave_0) entered disabled state 07:39:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100003, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1254.076436] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1254.189846] team0 (unregistering): Port device team_slave_1 removed [ 1254.243685] team0 (unregistering): Port device team_slave_0 removed [ 1254.295185] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1254.359006] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1254.454263] bond0 (unregistering): Released all slaves [ 1254.552935] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1255.306140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1255.312737] bridge0: port 1(bridge_slave_0) entered disabled state [ 1255.320760] device bridge_slave_0 entered promiscuous mode [ 1255.364751] bridge0: port 2(bridge_slave_1) entered blocking state [ 1255.371642] bridge0: port 2(bridge_slave_1) entered disabled state [ 1255.379729] device bridge_slave_1 entered promiscuous mode [ 1255.421420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1255.463257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1255.594815] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1255.649025] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1255.692203] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1255.699145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1255.741465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1255.749007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1255.840470] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1255.848263] team0: Port device team_slave_0 added [ 1255.890456] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1255.898057] team0: Port device team_slave_1 added [ 1255.928581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1255.958310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1255.992165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1255.999730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1256.010647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1256.064298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1256.071340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1256.080305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1256.335888] bridge0: port 2(bridge_slave_1) entered blocking state [ 1256.342269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1256.348909] bridge0: port 1(bridge_slave_0) entered blocking state [ 1256.355251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1256.363085] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1256.577625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1257.307105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1257.400034] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1257.493159] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1257.499600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1257.506547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1257.602953] 8021q: adding VLAN 0 to HW filter on device team0 07:39:18 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x200000000000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x7a000000}) 07:39:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10000c, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='/use\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1258.160614] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1258.169463] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1258.240565] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1258.250606] EXT4-fs: 6 callbacks suppressed [ 1258.250615] EXT4-fs (sda1): Cannot specify journal on remount [ 1258.270131] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1258.279758] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:18 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x60000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fpse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1258.291355] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c00a, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1258.400436] EXT4-fs (sda1): Cannot specify journal on remount [ 1258.456940] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1258.480114] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x7400}) [ 1258.521072] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1258.575135] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:18 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0xfeffff07], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1258.643778] EXT4-fs (sda1): Cannot specify journal on remount 07:39:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c019, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fcse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1258.758954] EXT4-fs (sda1): Cannot specify journal on remount 07:39:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:19 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x20000000], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x4000}) 07:39:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1258.810383] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1258.946235] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1258.963971] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1258.980514] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1258.994752] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1259.025348] EXT4-fs (sda1): Cannot specify journal on remount 07:39:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fdse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100006, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:19 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x5], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1259.136936] EXT4-fs (sda1): Cannot specify journal on remount 07:39:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2000000000000000}) [ 1259.267454] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1259.283810] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1259.303822] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:19 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320, 0x60], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1259.343999] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fXse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104002, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1259.498917] EXT4-fs (sda1): Cannot specify journal on remount [ 1259.526086] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:19 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x4, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1259.585310] EXT4-fs (sda1): Cannot specify journal on remount [ 1259.588896] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1259.599997] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1259.615129] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fxse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x700000000000000}) 07:39:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10001d, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1259.789401] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1259.789957] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1259.848156] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1259.863713] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='flse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1259.896607] EXT4-fs (sda1): Cannot specify journal on remount [ 1260.011222] EXT4-fs (sda1): Cannot specify journal on remount [ 1260.049659] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:20 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x90, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1260.063636] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108006, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2d000000}) 07:39:20 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x300000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1260.159406] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='f"se\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1260.324817] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1260.373759] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1260.391283] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='f,se\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1260.430281] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:20 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x3000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c00b, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x100000000000000}) [ 1260.611150] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1260.625633] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fose\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100019, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1260.819500] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1260.857007] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='f\nse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xffffff7f}) 07:39:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1261.085976] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1261.095772] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fsse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c00e, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1261.286600] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1261.306975] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1262.035339] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1262.177469] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x20000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='f%se\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x4800}) 07:39:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104016, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x9000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1262.908473] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1262.923992] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fise\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108010, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1263.079214] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1263.083007] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x7}) [ 1263.139978] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1263.140360] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x100000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fule\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1263.300077] EXT4-fs: 8 callbacks suppressed [ 1263.300086] EXT4-fs (sda1): Cannot specify journal on remount [ 1263.330766] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100011, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1263.373910] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1263.405925] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x2000000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x7000000}) 07:39:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuXe\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1263.428285] EXT4-fs (sda1): Cannot specify journal on remount [ 1263.453447] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104000, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x7000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1263.578876] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1263.640680] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1263.675030] EXT4-fs (sda1): Cannot specify journal on remount [ 1263.718813] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu+e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xdaa}) 07:39:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10401a, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1263.899510] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1263.954036] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1263.970125] EXT4-fs (sda1): Cannot specify journal on remount 07:39:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuce\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1264.130156] EXT4-fs (sda1): Cannot specify journal on remount 07:39:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x4}) [ 1264.184444] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1264.213322] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuue\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10401f, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1264.384246] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1264.436259] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1264.460913] EXT4-fs (sda1): Cannot specify journal on remount 07:39:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu#e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100016, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1264.558679] EXT4-fs (sda1): Cannot specify journal on remount [ 1264.684593] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1264.726017] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1266.185046] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1266.329564] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:28 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x600, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfdffffff00000000}) 07:39:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu.e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10400e, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1267.918827] EXT4-fs (sda1): Cannot specify journal on remount [ 1267.952474] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1267.960489] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c007, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:28 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x5, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1267.981897] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1267.997714] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1268.018710] EXT4-fs (sda1): Cannot specify journal on remount 07:39:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu"e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x7a00000000000000}) [ 1268.132715] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuie\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1268.220507] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1268.240616] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1268.290972] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c015, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1268.367064] EXT4-fs (sda1): Cannot specify journal on remount [ 1268.418714] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:28 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0xfeffff0700000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1268.459523] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuoe\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1268.520699] EXT4-fs (sda1): Cannot specify journal on remount 07:39:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x1000000000}) [ 1268.618487] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1268.644039] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10000d, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1268.676251] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1268.695302] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:29 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0xffffffff00000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fupe\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1268.843707] EXT4-fs (sda1): Cannot specify journal on remount [ 1268.903386] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1268.933480] EXT4-fs (sda1): Cannot specify journal on remount 07:39:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108017, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:29 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0xffffff7f00000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1268.951856] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1268.979270] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x10}) [ 1269.040598] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu%e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1269.096317] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1269.196384] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1269.225404] EXT4-fs (sda1): Cannot specify journal on remount [ 1269.227508] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108008, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:29 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x5000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1269.305186] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu-e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1269.366542] EXT4-fs (sda1): Cannot specify journal on remount 07:39:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfcfdffff}) 07:39:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1269.538104] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c012, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1269.590085] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuxe\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1269.787142] EXT4-fs (sda1): Cannot specify journal on remount 07:39:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1269.849254] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1269.864311] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1269.883849] EXT4-fs (sda1): Cannot specify journal on remount 07:39:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fude\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x3000000}) 07:39:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c00c, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1270.153744] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1270.170143] EXT4-fs (sda1): Cannot specify journal on remount [ 1270.183680] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu*e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1270.308257] EXT4-fs (sda1): Cannot specify journal on remount [ 1270.501618] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1270.548111] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1271.474028] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1271.664325] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2c00000000000000}) 07:39:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104014, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x2000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu,e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1272.811408] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1272.833749] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1272.871584] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1272.881864] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fu0e\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100014, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x3, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x40000000}) [ 1273.025587] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x9000000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1273.072054] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1273.073144] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1273.106127] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fus"\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1273.251887] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0xff00000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10400b, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x4c00}) 07:39:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fus,\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1273.344244] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1273.380373] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1273.485960] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1273.535570] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1273.551162] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1273.583394] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0xfeffff07, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10001c, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1273.643971] EXT4-fs: 4 callbacks suppressed [ 1273.643980] EXT4-fs (sda1): Cannot specify journal on remount 07:39:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1273.776612] EXT4-fs (sda1): Cannot specify journal on remount 07:39:34 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x6000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x300000000000000}) [ 1273.882361] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1273.910165] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104005, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1274.056185] EXT4-fs (sda1): Cannot specify journal on remount [ 1274.116441] EXT4-fs (sda1): Cannot specify journal on remount [ 1274.141095] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2c000000}) [ 1274.221944] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse"', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10400d, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1274.433928] EXT4-fs (sda1): Cannot specify journal on remount [ 1274.459577] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1274.471459] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1274.558737] EXT4-fs (sda1): Cannot specify journal on remount [ 1274.615617] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1274.673737] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1275.986859] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1276.040857] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100017, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x6c000000}) 07:39:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:37 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x6, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1277.491379] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1277.513001] EXT4-fs (sda1): Cannot specify journal on remount [ 1277.521175] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1277.564418] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1277.599744] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c001, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1277.624607] EXT4-fs (sda1): Cannot specify journal on remount 07:39:38 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x500000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x1800}) 07:39:38 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x4000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1277.777148] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1277.814639] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1277.860390] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c017, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1278.048289] EXT4-fs (sda1): Cannot specify journal on remount [ 1278.147882] EXT4-fs (sda1): Cannot specify journal on remount [ 1278.164471] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1278.177014] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xffffffffffffffff}) 07:39:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="667573658c", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c006, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1278.402964] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1278.464827] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x5}) 07:39:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10400c, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1278.639669] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1278.700593] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1278.819625] EXT4-fs: 2 callbacks suppressed [ 1278.819634] EXT4-fs (sda1): Cannot specify journal on remount [ 1278.935216] EXT4-fs (sda1): Cannot specify journal on remount [ 1279.784403] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1279.860937] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:41 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x1000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108002, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfffffdfc}) 07:39:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1280.828695] EXT4-fs (sda1): Cannot specify journal on remount [ 1280.841602] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1280.879435] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108019, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1280.937055] EXT4-fs (sda1): Cannot specify journal on remount 07:39:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfdfdffff00000000}) [ 1281.225350] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1281.264046] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1281.284495] EXT4-fs (sda1): Cannot specify journal on remount 07:39:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10800b, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse,', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1281.400396] EXT4-fs (sda1): Cannot specify journal on remount 07:39:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1281.516024] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1281.587062] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1281.853132] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1281.865086] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:42 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x6000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x4800000000000000}) 07:39:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="6675736503", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10401d, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1282.166771] EXT4-fs (sda1): Cannot specify journal on remount [ 1282.186120] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1282.212092] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c002, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1282.256117] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1282.291751] EXT4-fs (sda1): Cannot specify journal on remount 07:39:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\a', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:42 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0xff00, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1282.305714] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x6c00}) [ 1282.458456] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1282.480389] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:42 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x60, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1282.526576] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1282.598654] EXT4-fs (sda1): Cannot specify journal on remount [ 1282.605219] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108011, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1282.681133] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1282.695863] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:43 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x700, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfffffffd}) 07:39:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104003, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1282.951285] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1282.989628] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:43 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0xff000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1283.003516] EXT4-fs (sda1): Cannot specify journal on remount 07:39:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1283.044628] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:43 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0xffffff7f, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfffffdfd}) 07:39:43 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x7fffffe, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108014, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1283.364147] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1283.421204] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x108013, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xfcfdffff00000000}) [ 1283.749500] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1283.783188] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10801f, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1283.950026] EXT4-fs: 3 callbacks suppressed [ 1283.950051] EXT4-fs (sda1): Cannot specify journal on remount [ 1284.062798] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1284.077159] EXT4-fs (sda1): Cannot specify journal on remount [ 1284.097448] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="66757365f6", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2000}) 07:39:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10000f, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1284.351266] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1284.401962] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1284.432935] EXT4-fs (sda1): Cannot specify journal on remount [ 1284.594138] EXT4-fs (sda1): Cannot specify journal on remount [ 1285.497702] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:46 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x2, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100002, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x500}) [ 1286.699477] EXT4-fs (sda1): Cannot specify journal on remount [ 1286.724381] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:47 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x600000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1286.760858] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1286.772449] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c01a, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xa00}) 07:39:47 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x200000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1286.978822] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1287.044289] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1287.093351] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1287.141116] EXT4-fs (sda1): Cannot specify journal on remount [ 1287.162366] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:47 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x60000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104015, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1287.278665] EXT4-fs (sda1): Cannot specify journal on remount [ 1287.304334] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xffffff97}) [ 1287.333152] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:47 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x90000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:47 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x300, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10c018, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1287.631748] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1287.650008] EXT4-fs (sda1): Cannot specify journal on remount [ 1287.677549] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1287.688351] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1287.790457] EXT4-fs (sda1): Cannot specify journal on remount 07:39:48 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x7, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x104004, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 07:39:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1287.889169] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1287.898530] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x1800000000000000}) 07:39:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1288.019603] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:48 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x700000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1288.090873] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10401b, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1288.145721] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1288.194616] EXT4-fs (sda1): Cannot specify journal on remount [ 1288.238305] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:48 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x400000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1288.311356] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1288.333684] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'%ebug_want_extra_isize'}}]}) 07:39:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x68}) 07:39:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1288.553066] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1288.633250] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="66757365ff", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1288.976586] EXT4-fs: 3 callbacks suppressed [ 1288.976596] EXT4-fs (sda1): Cannot specify journal on remount [ 1289.014748] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1289.029928] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000000000" or missing value [ 1289.036382] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x8cffffff00000000}) 07:39:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={',ebug_want_extra_isize'}}]}) [ 1289.222588] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1289.244515] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1289.344363] EXT4-fs (sda1): Cannot specify journal on remount [ 1289.417848] EXT4-fs (sda1): Unrecognized mount option "ebug_want_extra_isize=0x0000000000000000" or missing value 07:39:49 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x6000000000000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1289.490067] EXT4-fs (sda1): Cannot specify journal on remount 07:39:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2200000000000000}) [ 1289.575170] EXT4-fs (sda1): Unrecognized mount option "ebug_want_extra_isize=0x0000000000000000" or missing value [ 1289.630118] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1289.659442] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'lebug_want_extra_isize'}}]}) 07:39:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1289.813621] EXT4-fs (sda1): Cannot specify journal on remount 07:39:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1289.927158] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1289.949815] EXT4-fs (sda1): Cannot specify journal on remount [ 1289.978317] device bridge_slave_1 left promiscuous mode [ 1289.985293] bridge0: port 2(bridge_slave_1) entered disabled state [ 1290.012054] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x68000000}) [ 1290.021948] EXT4-fs (sda1): Unrecognized mount option "lebug_want_extra_isize=0x0000000000000000" or missing value [ 1290.036263] IPVS: ftp: loaded support on port[0] = 21 [ 1290.060412] device bridge_slave_0 left promiscuous mode [ 1290.066208] bridge0: port 1(bridge_slave_0) entered disabled state 07:39:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1290.094307] EXT4-fs (sda1): Unrecognized mount option "lebug_want_extra_isize=0x0000000000000000" or missing value 07:39:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'|ebug_want_extra_isize'}}]}) [ 1290.228745] team0 (unregistering): Port device team_slave_1 removed [ 1290.242372] team0 (unregistering): Port device team_slave_0 removed [ 1290.271962] bond0 (unregistering): Releasing backup interface bond_slave_1 07:39:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2c}) 07:39:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1290.384696] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1290.516737] bond0 (unregistering): Released all slaves [ 1291.419578] bridge0: port 1(bridge_slave_0) entered blocking state [ 1291.426051] bridge0: port 1(bridge_slave_0) entered disabled state [ 1291.433434] device bridge_slave_0 entered promiscuous mode [ 1291.478560] bridge0: port 2(bridge_slave_1) entered blocking state [ 1291.485135] bridge0: port 2(bridge_slave_1) entered disabled state [ 1291.492601] device bridge_slave_1 entered promiscuous mode [ 1291.536753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1291.580717] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1291.711530] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1291.790813] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1291.970336] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1291.977775] team0: Port device team_slave_0 added [ 1292.004626] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1292.012383] team0: Port device team_slave_1 added [ 1292.055417] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1292.101920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1292.130577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1292.138128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1292.145942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1292.175385] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1292.182480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1292.191759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1292.450115] bridge0: port 2(bridge_slave_1) entered blocking state [ 1292.456547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1292.463362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.469804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1292.477167] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1292.597561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1293.443458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1293.539743] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1293.638206] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1293.644545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1293.652425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1293.744521] 8021q: adding VLAN 0 to HW filter on device team0 07:39:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'\nebug_want_extra_isize'}}]}) 07:39:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:54 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x2000000, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="66757365ff", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xffffffff00000000}) 07:39:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1294.316101] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1294.324951] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1294.364023] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1294.372577] EXT4-fs: 6 callbacks suppressed [ 1294.372588] EXT4-fs (sda1): Cannot specify journal on remount [ 1294.390957] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1294.428651] EXT4-fs (sda1): Unrecognized mount option " [ 1294.428651] ebug_want_extra_isize=0x0000000000000000" or missing value [ 1294.498870] EXT4-fs (sda1): Cannot specify journal on remount 07:39:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x500000000000000}) [ 1294.572723] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1294.580325] EXT4-fs (sda1): Unrecognized mount option " [ 1294.580325] ebug_want_extra_isize=0x0000000000000000" or missing value [ 1294.632126] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'"ebug_want_extra_isize'}}]}) 07:39:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1294.784293] EXT4-fs (sda1): Cannot specify journal on remount 07:39:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1294.861432] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1294.881338] EXT4-fs (sda1): Unrecognized mount option ""ebug_want_extra_isize=0x0000000000000000" or missing value [ 1294.896508] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1294.957983] EXT4-fs (sda1): Cannot specify journal on remount 07:39:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x6000000}) 07:39:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="6675736506", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1295.151143] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1295.195949] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1295.295440] EXT4-fs (sda1): Cannot specify journal on remount [ 1295.383617] EXT4-fs (sda1): Cannot specify journal on remount [ 1295.662917] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1295.745594] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x500, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x8cffffff}) 07:39:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'dlbug_want_extra_isize'}}]}) 07:39:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1296.233677] EXT4-fs (sda1): Unrecognized mount option "dlbug_want_extra_isize=0x0000000000000000" or missing value [ 1296.235860] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1296.277160] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1296.289815] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1296.409579] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1296.436875] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'d\nbug_want_extra_isize'}}]}) 07:39:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x1f00}) [ 1296.454375] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1296.458894] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1296.609468] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1296.626292] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1296.659669] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:57 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="6675736504", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1296.823952] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1296.851742] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1296.920534] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'d"bug_want_extra_isize'}}]}) 07:39:57 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x60}) 07:39:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1297.100462] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1297.124206] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1297.134137] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1297.142744] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:57 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}]}) 07:39:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x6000000000000000}) 07:39:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1297.399603] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1297.421699] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:57 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1297.459745] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'d,bug_want_extra_isize'}}]}) [ 1297.550715] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fusek', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:57 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1297.599211] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x5000000}) [ 1297.692853] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1297.713936] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1297.762279] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1297.789366] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="6675736502", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:58 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1297.968673] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}]}) [ 1298.009989] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1298.040316] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse`', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xf6ffffff}) 07:39:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:58 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1298.106216] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1298.285126] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:58 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1298.334744] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1298.356171] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2200}) 07:39:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'de,ug_want_extra_isize'}}]}) [ 1298.488212] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1298.544948] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1298.561835] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1298.566507] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:59 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:39:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'delug_want_extra_isize'}}]}) [ 1298.827861] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1298.878167] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1298.888826] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x4c}) [ 1298.925268] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:59 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="6675736505", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1299.123044] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1299.134701] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1299.162975] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:59 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1299.275396] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1299.286583] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:39:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'de\nug_want_extra_isize'}}]}) 07:39:59 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:39:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1299.375759] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:39:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2c00}) 07:39:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="667573657f", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1299.459059] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1299.474732] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:39:59 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1299.510868] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1299.551580] EXT4-fs: 30 callbacks suppressed [ 1299.551593] EXT4-fs (sda1): Unrecognized mount option "de [ 1299.551593] ug_want_extra_isize=0x0000000000000000" or missing value [ 1299.686176] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1299.696949] EXT4-fs (sda1): Unrecognized mount option "de [ 1299.696949] ug_want_extra_isize=0x0000000000000000" or missing value [ 1299.719630] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:00 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'de"ug_want_extra_isize'}}]}) [ 1299.736036] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1299.775859] EXT4-fs (sda1): Cannot specify journal on remount [ 1299.892988] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x2d00}) [ 1299.967204] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1299.977585] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1300.003102] EXT4-fs (sda1): Unrecognized mount option "de"ug_want_extra_isize=0x0000000000000000" or missing value 07:40:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1300.023949] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1300.089827] EXT4-fs (sda1): Cannot specify journal on remount [ 1300.189382] EXT4-fs (sda1): Unrecognized mount option "de"ug_want_extra_isize=0x0000000000000000" or missing value 07:40:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:00 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}]}) [ 1300.280436] EXT4-fs (sda1): Cannot specify journal on remount [ 1300.336532] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1300.344613] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1300.364912] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1300.374159] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x600}) 07:40:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:00 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1300.468288] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value 07:40:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1300.540518] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1300.574947] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1300.614408] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value [ 1300.650697] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:01 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1300.659691] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb,g_want_extra_isize'}}]}) [ 1300.721952] EXT4-fs (sda1): Cannot specify journal on remount [ 1300.782889] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1300.864983] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1300.886715] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:01 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1300.922207] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x40000000000000}) 07:40:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="66757365c0", 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1301.033382] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1301.039760] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:01 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1301.145196] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb+g_want_extra_isize'}}]}) [ 1301.249713] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1301.281012] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:01 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1301.389095] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1301.419803] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xf6ffffff00000000}) 07:40:01 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1301.478583] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1301.507018] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1301.634686] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1301.665438] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:02 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1301.715417] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1301.768151] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb#g_want_extra_isize'}}]}) 07:40:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x1f00000000000000}) 07:40:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1301.891230] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1301.904937] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:02 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x60, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1302.094875] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1302.096529] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1302.118921] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:02 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}]}) 07:40:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x47, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1302.309910] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1302.319553] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1302.333836] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:02 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0x22000000}) 07:40:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x7, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1302.524300] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:02 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb*g_want_extra_isize'}}]}) 07:40:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x9, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [], 0xaa0d}) [ 1302.740345] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0xb, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}]}) [ 1302.974518] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1303.115860] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0xa, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e2f7a02662d66696c65302c006913daab8ae837eca59b499f2c0d03ece4cf6a9fe23fa1dd5b1dd36cdb9469ca8016d06c3d4c7c089a8b1e41a80e4f43f83c7a4e8b28146cb2636cdfb1ff725e83"]) 07:40:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1303.301082] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x25, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}]}) 07:40:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e2f8ece200f302c00"]) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x200000, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000180)={0x3, 0xfffffffffffffc01}) chdir(&(0x7f0000000480)='./file0\x00') ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000440)={0x80, 0x1e, &(0x7f00000003c0)="4a61bacc2060dd3a8df86373518c6140d47d16275eaa00a01ad0881943505720cae244e0803750dac174b91b50f3fd7cf6ba65156263bfe9ff1e514058143ba179a35b357ef44a6af2e7b6be5f539801c666b29d446baa0c1813039859e43d30580ba0a3aaa27caec5b3", {0x3, 0x9e1, 0x0, 0xb, 0xdffffffffffffff9, 0x28cd, 0xf, 0xfffffffffffff000}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r1, 0x6e, "afbe0d", "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"}}, 0x110) [ 1303.518665] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1303.586641] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1303.701035] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'.d'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}]}) [ 1303.790610] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1303.974201] cgroup: cgroup2: unknown option ".d=0xffffffffffffffff" [ 1304.044361] cgroup: cgroup2: unknown option ".d=0xffffffffffffffff" [ 1304.048595] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x200000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000240)={0xff, {{0xa, 0x4e24, 0x5, @mcast2, 0x7fffffff}}}, 0x88) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000200)={r1}) 07:40:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'/d'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1304.241494] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}]}) [ 1304.282740] cgroup: cgroup2: unknown option "/d=0xffffffffffffffff" 07:40:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1304.326676] cgroup: cgroup2: unknown option "/d=0xffffffffffffffff" 07:40:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'\nd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1304.456390] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') [ 1304.524626] cgroup: cgroup2: unknown option " [ 1304.524626] d=0xffffffffffffffff" [ 1304.562194] cgroup: cgroup2: unknown option " [ 1304.562194] d=0xffffffffffffffff" 07:40:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'"d'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1304.579532] EXT4-fs: 33 callbacks suppressed [ 1304.579546] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value 07:40:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}]}) [ 1304.742624] cgroup: cgroup2: unknown option ""d=0xffffffffffffffff" [ 1304.769293] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1304.788830] cgroup: cgroup2: unknown option ""d=0xffffffffffffffff" [ 1304.799330] EXT4-fs (sda1): Cannot specify journal on remount [ 1304.830773] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000000000" or missing value 07:40:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{',d'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000180)={0x0, 0xffff, 0x3, 0x7ff}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1304.963512] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000000000" or missing value 07:40:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1305.033133] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1305.035474] cgroup: cgroup2: unknown option "" [ 1305.085578] cgroup: cgroup2: unknown option "" 07:40:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}]}) 07:40:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'f"'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1305.193482] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1305.296055] cgroup: cgroup2: unknown option "f"=0xffffffffffffffff" [ 1305.348342] cgroup: cgroup2: unknown option "f"=0xffffffffffffffff" 07:40:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'f,'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1305.410770] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value [ 1305.421099] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:05 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2000) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000280)={0xa20000, 0x4be, 0xc7, [], &(0x7f0000000200)={0x990a60, 0x1f, [], @value64=0x40}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x100, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000180)={0x2, 0xf000, 0x0, 0x71, 0xfff}) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1305.514474] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value [ 1305.604798] cgroup: cgroup2: unknown option "f" 07:40:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}]}) 07:40:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1305.653731] cgroup: cgroup2: unknown option "f" [ 1305.659164] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'f\n'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1305.867814] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1305.909474] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value [ 1305.940216] cgroup: cgroup2: unknown option "f [ 1305.940216] =0xffffffffffffffff" 07:40:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1306.000317] device bridge_slave_1 left promiscuous mode [ 1306.006060] bridge0: port 2(bridge_slave_1) entered disabled state [ 1306.014595] cgroup: cgroup2: unknown option "f [ 1306.014595] =0xffffffffffffffff" [ 1306.034188] IPVS: ftp: loaded support on port[0] = 21 07:40:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb0g_want_extra_isize'}}]}) [ 1306.094756] device bridge_slave_0 left promiscuous mode 07:40:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd', 0x22}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1306.116055] bridge0: port 1(bridge_slave_0) entered disabled state [ 1306.129304] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1306.252615] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1306.323286] cgroup: cgroup2: unknown option "fd"0xffffffffffffffff" [ 1306.323484] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value [ 1306.412477] team0 (unregistering): Port device team_slave_1 removed [ 1306.436403] team0 (unregistering): Port device team_slave_0 removed [ 1306.470966] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1306.482990] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value [ 1306.543232] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1306.684496] bond0 (unregistering): Released all slaves [ 1306.768023] cgroup: cgroup2: unknown option "fd"0xffffffffffffffff" [ 1307.408100] bridge0: port 1(bridge_slave_0) entered blocking state [ 1307.414580] bridge0: port 1(bridge_slave_0) entered disabled state [ 1307.422053] device bridge_slave_0 entered promiscuous mode [ 1307.464862] bridge0: port 2(bridge_slave_1) entered blocking state [ 1307.471416] bridge0: port 2(bridge_slave_1) entered disabled state [ 1307.478829] device bridge_slave_1 entered promiscuous mode [ 1307.521033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1307.563689] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1307.688650] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1307.733439] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1307.799766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1307.807157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1307.849760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1307.856621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1307.967905] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1307.975014] team0: Port device team_slave_0 added [ 1308.002907] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1308.010198] team0: Port device team_slave_1 added [ 1308.050944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1308.097385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1308.127834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1308.134875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1308.144160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1308.178029] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1308.185145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1308.196315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1308.464037] bridge0: port 2(bridge_slave_1) entered blocking state [ 1308.470442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1308.477033] bridge0: port 1(bridge_slave_0) entered blocking state [ 1308.483428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1308.490655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1308.777584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1309.712230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1309.800900] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1309.891928] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1309.898201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1309.908784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1310.000028] 8021q: adding VLAN 0 to HW filter on device team0 [ 1310.531732] EXT4-fs (sda1): Cannot specify journal on remount [ 1310.569040] EXT4-fs (sda1): Cannot specify journal on remount 07:40:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x10000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000280)) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) listen(r0, 0x3) 07:40:10 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x400000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb\ng_want_extra_isize'}}]}) 07:40:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd', 0x2c}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1310.691425] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1310.694267] cgroup: cgroup2: unknown option "fd" [ 1310.706676] EXT4-fs (sda1): Unrecognized mount option "deb [ 1310.706676] g_want_extra_isize=0x0000000000000000" or missing value [ 1310.720241] cgroup: cgroup2: unknown option "fd" 07:40:11 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0xff000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd', 0x47}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1310.821434] EXT4-fs (sda1): Unrecognized mount option "deb [ 1310.821434] g_want_extra_isize=0x0000000000000000" or missing value 07:40:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb"g_want_extra_isize'}}]}) [ 1310.911266] EXT4-fs (sda1): Cannot specify journal on remount [ 1310.963698] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1310.979174] cgroup: cgroup2: unknown option "fdG0xffffffffffffffff" 07:40:11 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x700, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1311.014324] cgroup: cgroup2: unknown option "fdG0xffffffffffffffff" 07:40:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd', 0xa}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1311.069523] EXT4-fs (sda1): Cannot specify journal on remount [ 1311.155855] EXT4-fs (sda1): Unrecognized mount option "deb"g_want_extra_isize=0x0000000000000000" or missing value 07:40:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1311.264497] EXT4-fs (sda1): Unrecognized mount option "deb"g_want_extra_isize=0x0000000000000000" or missing value 07:40:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) setitimer(0x2, &(0x7f00000001c0)={{0x0, 0x2710}, {r0, r1/1000+30000}}, &(0x7f0000000200)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000100)) mount$bpf(0x20000000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1311.307665] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1311.316451] cgroup: cgroup2: unknown option "fd [ 1311.316451] 0xffffffffffffffff" 07:40:11 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x500, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb-g_want_extra_isize'}}]}) [ 1311.358261] cgroup: cgroup2: unknown option "fd [ 1311.358261] 0xffffffffffffffff" 07:40:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x58, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1311.498859] EXT4-fs (sda1): Cannot specify journal on remount 07:40:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='system.advise\x00', &(0x7f00000001c0)='journal_path', 0xc, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'osx.', '\x00'}, &(0x7f00000002c0)=""/49, 0x31) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 07:40:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1311.768310] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000000000" or missing value [ 1311.809846] cgroup: cgroup2: unknown option "fd=0xffffffffffffffffXrootmode=00000000000000000000000" [ 1311.850960] cgroup: cgroup2: unknown option "fd=0xffffffffffffffffXrootmode=00000000000000000000000" 07:40:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x22, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deb.g_want_extra_isize'}}]}) [ 1311.990280] SELinux: security_context_str_to_sid(user_u) failed for (dev sda1, type ext4) errno=-22 [ 1312.091798] SELinux: security_context_str_to_sid(user_u) failed for (dev sda1, type ext4) errno=-22 07:40:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ceph(&(0x7f0000000100)='ceph\x00', &(0x7f0000000180)='./file0\x00', 0x1873, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="d758264bd3aa946b0141f2b3172f85095b721fc7138bdb53a0b768106cdcec29cef4d65418e9dd5debe90d46c4d4b9214c8059c4829475c8b1a357efc13caa8930d6eeffb61fa5d25b778ab30fec6ae33b28221a03a4fbd80f3674bbdde4e04a14ad428dbff49651b50d7ec60eec0d616612e3bb635a86a27e0632e89ff487f2a87e0785bb8bd309dd968d19a72d21095f2309556b97dba4f0ad2a1ae3288c14", 0xa0, 0x1}], 0x400, &(0x7f0000000200)='ext2\x00') mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1312.174054] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff"rootmode=00000000000000000000000" 07:40:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1312.252085] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff"rootmode=00000000000000000000000" 07:40:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x47, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:12 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x3, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}]}) [ 1312.452329] ceph: device name is missing path (no : separator in /dev/loop5) [ 1312.489395] cgroup: cgroup2: unknown option "fd=0xffffffffffffffffGrootmode=00000000000000000000000" [ 1312.576793] cgroup: cgroup2: unknown option "fd=0xffffffffffffffffGrootmode=00000000000000000000000" 07:40:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'\nootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:13 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getpeername(r0, &(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x80) r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x2, 0x400) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280), &(0x7f00000002c0)=0xb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1312.708448] device bridge_slave_1 left promiscuous mode [ 1312.713974] bridge0: port 2(bridge_slave_1) entered disabled state [ 1312.772286] device bridge_slave_0 left promiscuous mode [ 1312.811531] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debul_want_extra_isize'}}]}) [ 1312.863238] IPVS: ftp: loaded support on port[0] = 21 07:40:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1312.916456] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1312.974077] team0 (unregistering): Port device team_slave_1 removed [ 1312.996875] team0 (unregistering): Port device team_slave_0 removed [ 1313.052056] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1313.102873] bond0 (unregistering): Releasing backup interface bond_slave_0 07:40:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1313.213226] bond0 (unregistering): Released all slaves 07:40:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debu\n_want_extra_isize'}}]}) 07:40:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'"ootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1313.296556] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1313.478792] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1313.528697] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'%ootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1313.754964] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1313.821033] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1314.552485] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.561527] bridge0: port 1(bridge_slave_0) entered disabled state [ 1314.569514] device bridge_slave_0 entered promiscuous mode [ 1314.654199] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.660757] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.668768] device bridge_slave_1 entered promiscuous mode [ 1314.725820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1314.768199] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1314.870339] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1314.923892] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1315.099629] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1315.106759] team0: Port device team_slave_0 added [ 1315.133867] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1315.141054] team0: Port device team_slave_1 added [ 1315.168088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1315.207009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1315.236223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1315.264859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1315.518447] bridge0: port 2(bridge_slave_1) entered blocking state [ 1315.524897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1315.531604] bridge0: port 1(bridge_slave_0) entered blocking state [ 1315.538012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1315.545516] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1316.397540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1316.498658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1316.590977] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1316.683051] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1316.689859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1316.696826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1316.789049] 8021q: adding VLAN 0 to HW filter on device team0 07:40:17 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x5, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debu"_want_extra_isize'}}]}) 07:40:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {',ootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x100000000, 0x10000) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000180)={0x5, 0x1, 0x2, 0x30000000000000, 0x92ac}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) [ 1317.331867] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1317.344117] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1317.422969] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1317.438516] EXT4-fs: 10 callbacks suppressed [ 1317.438530] EXT4-fs (sda1): Unrecognized mount option "debu"_want_extra_isize=0x0000000000000000" or missing value [ 1317.450615] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1317.476558] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'r\notmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1317.518208] EXT4-fs (sda1): Unrecognized mount option "jaurnalµ(A”Ú… ±€}@×\uí:0p@T©ŒÅD" or missing value [ 1317.520001] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:17 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x7000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1317.593288] EXT4-fs (sda1): Unrecognized mount option "debu"_want_extra_isize=0x0000000000000000" or missing value 07:40:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debu,_want_extra_isize'}}]}) [ 1317.695069] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1317.712804] EXT4-fs (sda1): Unrecognized mount option "jaurnalµ(A”Ú… ±€}@×\uí:0p@T©ŒÅD" or missing value [ 1317.731339] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1317.766803] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1317.768975] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'r"otmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:18 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x6000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:18 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x20000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000180)="9a463893aa91f935fdbed5ea04d191c5ba4a48f57662604eff73cc3ad0efca9092515c216535a18f4aee870994a7629d797216955e7671fece88eb152aaca67df5dbd9131c73c2dbd83204eae989aceb9079a291f29ab23e1c1319cf1765bc4a13a9786d08590f6cd0aabe0625a5d654faa9617dbd75362ce03a849ea1e52047831189aca9fb4125cac37d9a2be88c39ce1f9556748f2f1e6227049dcff0dea6c55491cbe2df25aba71aaf4696", &(0x7f0000000280)=""/47}, 0x18) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) quotactl(0x6, &(0x7f00000003c0)='./file0\x00', r1, &(0x7f0000000540)="b14540304f44d6957f36895d82e2e4ca18a1e8120d584ed8b9e83bab11e71eee0805da174ca5d729678140cef74a915b6617b4c3ec031db4d9d4a94b8e") recvfrom(r0, &(0x7f0000000300)=""/174, 0xae, 0x100, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1317.952751] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1317.955138] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1318.007749] EXT4-fs (sda1): Unrecognized mount option "debu" or missing value [ 1318.008827] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'r%otmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1318.088926] EXT4-fs (sda1): Cannot specify journal on remount [ 1318.097218] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1318.149532] EXT4-fs (sda1): Unrecognized mount option "debu" or missing value [ 1318.185178] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:18 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x6, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1318.194818] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debuglwant_extra_isize'}}]}) 07:40:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'r,otmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:18 executing program 5: mkdir(&(0x7f0000000180)='./file0/file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f00000000000000d975063a46b866000000000000"]) [ 1318.366986] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1318.379173] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1318.404217] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:18 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x4, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1318.412551] EXT4-fs (sda1): Unrecognized mount option "debuglwant_extra_isize=0x0000000000000000" or missing value [ 1318.429288] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1318.508042] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'ro\ntmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:18 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x700000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1318.552362] EXT4-fs (sda1): Unrecognized mount option "debuglwant_extra_isize=0x0000000000000000" or missing value 07:40:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug\nwant_extra_isize'}}]}) [ 1318.708835] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1318.718586] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@random={'system.', '.-\x00'}, &(0x7f0000001280)=""/4096, 0x1393) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:19 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x90000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1318.772398] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'ro"tmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1318.903825] EXT4-fs (sda1): Unrecognized mount option "debug [ 1318.903825] want_extra_isize=0x0000000000000000" or missing value [ 1318.961693] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1319.002643] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1319.011668] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1319.041485] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:19 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x2000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x202000, 0x0) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000280)=0x6e) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) fchdir(r1) 07:40:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'ro%tmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug"want_extra_isize'}}]}) 07:40:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1319.194871] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:19 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x2000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1319.337866] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1319.362527] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1319.385130] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:19 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x7, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = geteuid() getresuid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x8, &(0x7f00000005c0)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap='nodevmap'}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@msize={'msize', 0x3d, 0xaa1}}, {@cache_none='cache=none'}, {@posixacl='posixacl'}, {@access_uid={'access', 0x3d, r1}}, {@version_u='version=9p2000.u'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '-eth1vmnet0'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsroot={'smackfsroot', 0x3d, 'journal_path'}}, {@euid_lt={'euid<', r2}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@euid_lt={'euid<', r4}}, {@subj_type={'subj_type', 0x3d, 'bpf\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'journal_path'}}]}}) 07:40:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'ro,tmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug,want_extra_isize'}}]}) [ 1319.565466] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1319.591464] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1319.670517] 9pnet: p9_fd_create_tcp (7471): problem connecting socket to 127.0.0.1 [ 1319.671156] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:20 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0xfeffff0700000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1319.761258] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1319.769330] 9pnet: p9_fd_create_tcp (7479): problem connecting socket to 127.0.0.1 07:40:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) mkdir(&(0x7f0000000100)='./file0\x00', 0x80) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r0, &(0x7f0000000380)=""/134, 0x86) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xaaaaaaaaaaaaccf, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x20040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @broadcast}, &(0x7f00000004c0)=0xc) connect$packet(r1, &(0x7f0000000500)={0x11, 0x1b, r2, 0x1, 0x8, 0x6, @dev={[], 0x1b}}, 0x14) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000780)=""/187) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000740)={&(0x7f0000000600), 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x54, r3, 0xd52e6ab48ad08fe5, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x95f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xdea}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe629}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4005) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) ftruncate(r1, 0x3800000000000000) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={r2, 0x3, 0x9, 0x0, 0x81, 0x2, 0x9}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0xf}, 0x9}, {0xa, 0x4e22, 0xffffffffffffffff, @mcast2, 0x40}, r5, 0x100000001}}, 0x48) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000540)={0x80000001, 0xe6}) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000840), &(0x7f0000000880)=0xc) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f00000005c0)) 07:40:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'roo\nmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1319.904573] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_"ant_extra_isize'}}]}) 07:40:20 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x2000000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1320.098805] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1320.154854] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1320.177006] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:20 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0xfeffff07, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1320.198769] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'roo"mode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_,ant_extra_isize'}}]}) 07:40:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400, 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000180)=0x8, 0x4) [ 1320.351413] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1320.470985] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'roo%mode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:21 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x300, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_\nant_extra_isize'}}]}) 07:40:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1320.732456] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1320.761265] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'roo,mode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:21 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x60, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1320.806914] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1320.837612] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00', 0xffffffffffffffff}, 0x30) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f0000000500)=0x6e, 0x80000) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000540)) syz_open_procfs(r0, &(0x7f0000000440)='setgroups\x00') r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x9b35, 0x42000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000380)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], 0x4, 0x2, 0x5, 0x1}) r3 = socket$inet(0x2b, 0x1, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000600), 0x10, &(0x7f0000000680)={&(0x7f0000000240)=@can={{0x6}, 0x0, 0x0, 0x0, 0x0, "ac684f6932efdf3b"}, 0x10}, 0x1, 0x0, 0x0, 0x44}, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x9917, 0xffff}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = socket(0x11, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'gre0\x00', 0x0}) bind$packet(r8, &(0x7f0000000200)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet_sctp(r8, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) syz_kvm_setup_cpu$x86(r3, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000800)="260f30d89c2f0001c0feb9e40a0000b8bfb10000ba000000000f3066baa00066b8613a66ef0f017800660f3824f866660f38801d0700000066ba4100b00aee0fc79ac4f9000066baf80cb8d6d6a485ef66bafc0cb00fee"}], 0x305, 0xfdfffffffffffffc, &(0x7f0000000740), 0x1370) setxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) bind$alg(r5, &(0x7f00000003c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(hmac(md5),ctr-serpent-avx)\x00'}, 0x58) ioctl$KVM_RUN(r7, 0xae80, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000540)='/selinux/coMmit_pendIng_bools\x00') ioctl$KVM_IRQ_LINE(r6, 0x4008ae61, &(0x7f0000000340)={0x1, 0x101}) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x800000000002401, 0x0) ioctl$VIDIOC_G_MODULATOR(r10, 0xc0445636, &(0x7f0000000180)={0x100000000, "14688eae13d79076149f582e978dbc9875412ad39fba54cbd8ddb9fb94284f17", 0x50, 0xffffffffffffff81, 0x1f, 0x0, 0x7}) 07:40:21 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x600000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1321.019883] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1321.053232] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1321.084235] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wlnt_extra_isize'}}]}) 07:40:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'root"ode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:21 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x6000000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1321.219957] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1321.255945] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:21 executing program 5: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x20, {{0xa, 0x4e23, 0x200, @empty, 0xfffffffffffffffb}}, 0x1}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100024, &(0x7f0000000100)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1321.398228] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'root,ode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:21 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0xffffff7f00000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1321.464521] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1321.481062] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}]}) 07:40:22 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x4000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1321.619988] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1321.637731] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1321.660879] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootm"de'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1321.797590] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1321.818127] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:22 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x20000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1321.890808] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:22 executing program 5: rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x28) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_w"nt_extra_isize'}}]}) [ 1321.951609] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootm%de'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1322.024704] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:22 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0xffffff7f, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1322.146722] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x2001001, &(0x7f0000000180)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000140)="b47da76fdc96f8dc7faff0aa11f4a8706279e281bcd5ae55251ad8fd2e75494479ef7a568a50e663999d4f88d79a97ae62c9c43a8bacda66c537eb25ef8d7e6f0121331e3595c8c0a7a1a1ef9e10e18c3396d56e4e9e2aad16f5d65a8a509379b55376926ed030fb6c2699402be3b1", 0x6f, 0x4ed8}, {&(0x7f00000001c0)="911efb898dec55224205d3bb635fb8a8200f9fd763b3", 0x16, 0x8}, {&(0x7f0000000280)="35f9f80bcc77b9eaa817342e38bc99708aa0d64dc6b468b82dfe5e2406a85df83c04deb7892bb154ea16b78e9fbf014f0f62d82777a8ab7012b1691d1e3e4321e1aa9ac0b579a040b202d72f3bd3664d03908ef5f8db65647da43757656ca18e9d5af398c8bc903fcf3f6c57b6584157ad041dc76eac768353d5d5076a529052c1dac449cb49", 0x303, 0x3ff}, {&(0x7f0000000340)="103fa2926942a717dfc6a2c300e02ff9e75635d192d98b12c9249c6d4620631a031b231fa140d2f3ebba9a4c4275dacd9b6a2bd01ada42b85d6bfec363558fa7182453d2f7bb6d4568bb0b354f1d603d70c4e351c6b5b451cbf03ffb12d13c64b1e8207ce7e227bd900016cadb78e46cd5f21df4aca2c5817c63cb3336f2e55232e833c4d7bb23b711bd55988ad6082b581a77ce0aa781f62c798a7da2686a4ac91aebeda5b4696f21d0640932e3f5edc86bb737e116b8217eb432221246cf2a4dbc706a94fc", 0xc6, 0x3}, {&(0x7f0000000440)="91b3f91aac7d569ea24868523ade12c1b26798c9f4e8dfdf0948a26d5398ebd83eeb17171eff1123b82fe8cb0ab5a7cf6d9c04a16c33b2e98313e0b9692910153493217c6a8f576fe71ac7905f87afafcbd2fedc4bd42d484f7c7433842802c47463a89072cfba3ba1af8671922a77e23b525a7d8c143cc5c24aa5323fedbb9911aab4c2f12181484100e635e21296853680fadac04cbaeb5e63161a8f2acba8ec38029b9d0e100a665129dec31f4c60a4388c0d76e2bb058e2ff91852d119d1609ffc480842bd", 0xc7, 0x3}, {&(0x7f0000000540)="c369bad27451f25aa3b1bcc80f9ca895d838b4514f130f307d0ca03df75b77f2a70f059e594d8014d84781ed1bd4ed9f61e3fad7565f46b57c370cb59a57909e29cc832b2383bb83cb1c530a019551", 0x4f, 0x80000000}, {&(0x7f0000000200), 0x0, 0x801}], 0x100020, &(0x7f0000000080)) [ 1322.190229] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1322.242492] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1322.286783] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootm,de'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}]}) 07:40:22 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x100000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:22 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x500000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1322.471703] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1322.508446] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:22 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x12) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1322.535424] EXT4-fs: 27 callbacks suppressed [ 1322.535435] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value [ 1322.584836] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1322.592446] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x200000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1322.626977] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootm\nde'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x1000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1322.728819] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1322.739507] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value [ 1322.741749] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_w,nt_extra_isize'}}]}) [ 1322.829497] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1322.891437] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1322.896587] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) getgroups(0x1, &(0x7f0000000200)=[0xee01]) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000280)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@privport='privport'}, {@version_9p2000='version=9p2000'}, {@cache_fscache='cache=fscache'}, {@cache_mmap='cache=mmap'}], [{@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0xc4a0}}, {@hash='hash'}]}}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d790f62c13b72d4f739"]) 07:40:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmo"e'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1322.940450] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x60000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1323.024937] EXT4-fs (sda1): Unrecognized mount option "debug_w" or missing value 07:40:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1323.077843] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1323.117003] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x600, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmo,e'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1323.131279] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1323.139045] EXT4-fs (sda1): Cannot specify journal on remount [ 1323.157622] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1323.221414] EXT4-fs (sda1): Unrecognized mount option "debug_w" or missing value 07:40:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wa"t_extra_isize'}}]}) [ 1323.277701] EXT4-fs (sda1): Cannot specify journal on remount [ 1323.298635] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x9, 0x802, 0x7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x4, 0x8000, 0x200, 0x52bb, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x2, 0x30}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1323.346447] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1323.370024] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1323.393772] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmo\ne'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:23 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x7fffffe, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1323.577155] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1323.586738] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1323.622164] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1323.633416] EXT4-fs (sda1): Unrecognized mount option "debug_wa"t_extra_isize=0x0000000000000000" or missing value [ 1323.666342] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmod"'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:24 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x300000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1323.707986] EXT4-fs (sda1): Cannot specify journal on remount [ 1323.770098] EXT4-fs (sda1): Unrecognized mount option "debug_wa"t_extra_isize=0x0000000000000000" or missing value [ 1323.814393] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1323.864826] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1323.872363] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1323.881172] EXT4-fs (sda1): Cannot specify journal on remount 07:40:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize'}}]}) 07:40:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmod,'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:24 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x9000000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1323.909340] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000900)='./file0\x00', &(0x7f0000000880)='bpf\x00', 0x2008000, &(0x7f00000008c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x45c, 0x3, &(0x7f0000000380)=[{&(0x7f0000000280)="79c1bb7954d27add6df28c3d0b808508a7deb1d93e41ede1532d9e87199438fd7a57b69bf019129dbe8d4f07eaffe1b58da263982698b29fb9224758917bb4365584161e763fa74d0fdc5ec9bfa434cdd956a6b34f57d0e23d8fee369e7e396d114f0a3be11ceff0fc0f75333733df542683bcf272deb7e93f358655de48b40cb4253dda2e10eca3b164b9c1e54eb497aded79f7510062cbce0ef1f29e1396f0610b760cbfe0ed79cc52d2b0461a15caa9421d247b7968e580a6ad42d561c4d30385ef2f7fbc7c282329a74d95e277b49f4644967eb15d3c", 0xd8, 0xfffffffffffff076}, {&(0x7f00000001c0)="7a4eaa061bbd4fbaf236f3c5951381501ff76d33cf4da77092e3d2490076989f3b4b3bade6", 0x25, 0x708d9e5c}, {&(0x7f0000000200)="c71a92cad65460999c43a9dad288bbb7f95b2b5cc2cff38f8281f1eb974430d3eda7a5b4692d5cb71b8b16226570106d80eb319947f0522561c2a0db8903", 0x3e, 0x100000001}], 0x102000, &(0x7f0000000780)={[{@gid={'gid', 0x3d, r0}}], [{@obj_user={'obj_user'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_lt={'fowner<', r2}}, {@uid_gt={'uid>', r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x0, 0x38, 0x33, 0x0, 0x32, 0x32], 0x2d, [0x64, 0x0, 0x36, 0x39], 0x2d, [0x3f, 0x38, 0x62, 0x63], 0x2d, [0x63, 0x33, 0x31, 0x61], 0x2d, [0x65, 0x0, 0x62, 0x0, 0x0, 0x31, 0x0, 0x37]}}}, {@subj_type={'subj_type', 0x3d, 'journal_path'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x7b, 0x33, 0x38, 0x73, 0x38, 0x7f, 0x76], 0x2d, [0x71, 0x63, 0x0, 0x77], 0x2d, [0x35, 0x77, 0x37, 0x77], 0x2d, [0x32, 0x66, 0x0, 0x39], 0x2d, [0x0, 0x63, 0x35, 0x67, 0x77, 0x76, 0x3f, 0x66]}}}, {@audit='audit'}]}) [ 1324.069293] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1324.076373] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:24 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x6000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1324.115839] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x47}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1324.232651] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:24 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x3000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wa,t_extra_isize'}}]}) [ 1324.319902] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1324.350956] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0xa}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1324.416290] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:24 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x9000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1fb, &(0x7f0000000100), 0x200000100020, &(0x7f0000000280)) [ 1324.574759] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1324.625682] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x22}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wa\nt_extra_isize'}}]}) 07:40:25 executing program 5: r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000200)={0x80000001, 0x1, 0x5, 0xfffffffffffffff8}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB='journal_path=./file0\f\x00']) [ 1324.949952] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1324.999221] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x2c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1325.236454] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1325.273829] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:25 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x90, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wan\n_extra_isize'}}]}) 07:40:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xff, 0x100) syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x2, 0x0) r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x80000) write$USERIO_CMD_REGISTER(r3, &(0x7f0000000100)={0x0, 0x7}, 0x2) connect(r1, &(0x7f0000000340)=@nfc={0x27, 0x0, 0x2, 0x6}, 0x80) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="6a6f7572f76eb0b2e0017087ef7cab242f6e616c5f70617468252e2f61696c65302c00"]) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x5, &(0x7f0000000600)=[{&(0x7f0000000400)="34b1c913b6f38f7bba824d271d41edaf5ae00f82eeef1377f1ea1a723883f831270b9e1f4ab127b744227c3592ad6ca98f2a9fd6621371fc2aeaa48a30bc47d67f193d9b6b93548819873e88f13c7f1e3a601578ac27af46363d83f796fd67450f5b834222c4fbd746459dbc71cab4f9d844ea78dec9dd0343860fc43bd6c22783346ddec3fcdb798953d769f78ebe", 0x8f, 0x8}, {&(0x7f00000004c0)="066ccb8a695d3ee0a456a5c7464d3027117e070a0345c4f451f264d8c7549f0ef6d6ac69bf46fa43cb742cdf4b9ae3895020c7b3ac7fa7a95d9c72de1c3976aa5dacfb2f7b44f6009679533df13b9c8df39cd839e9", 0x55, 0x3f}, {&(0x7f0000000540)="e6419d05f4136316d0af83d6c6d5fd3ed01fa9a523d385cc7b31f9dc88e4fe3ae0b6606dcc195a17296f30384b64c77f63420e", 0x33, 0x3}, {&(0x7f0000000580)="a339f1f2c9366b8d2dbe24f034fa70b21dff3e22be3af3fcf5f2dd381d6f0d1e10906c55", 0x24, 0x3}, {&(0x7f00000005c0)="8f5ccd0b227b69bae9701936b1ab7a8a9f46d921e5109f8a18e90eb0", 0x1c, 0x2}], 0x1, &(0x7f0000000680)={[{@oldalloc='oldalloc'}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, '8&vmnet1usermd5sumcpuset'}}, {@appraise_type='appraise_type=imasig'}]}) 07:40:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x7}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1325.561509] IPVS: ftp: loaded support on port[0] = 21 [ 1325.680954] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1325.756815] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1325.768543] device bridge_slave_1 left promiscuous mode [ 1325.774088] bridge0: port 2(bridge_slave_1) entered disabled state 07:40:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wan"_extra_isize'}}]}) 07:40:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2200000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)=0x0) r1 = syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x5, 0x400) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x0, 0xffffffff, 0x9, 0x1, 0x0, 0x1bb3, 0x20004, 0x0, 0x10000, 0x2, 0x0, 0xffffffffffff6992, 0x5, 0xff, 0x0, 0x0, 0xff, 0x85, 0x6, 0x9, 0x1, 0x6, 0x3, 0x3, 0x9, 0x4, 0x3f, 0x3a0a, 0x2400000000000000, 0xfffffffffffffffa, 0x2, 0x5, 0x4, 0x2, 0x6, 0x6, 0x0, 0x0, 0x59de276482b0b689, @perf_config_ext={0x1000, 0x9}, 0x40, 0xfffffffffffffff9, 0x6, 0x0, 0x0, 0x7, 0x1000}, r0, 0xa, r1, 0xb) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x16340fca, 0x12100) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000200)={0x4, 0xb4f, &(0x7f0000000280)="742566a8204683ca8781495aaf45a482edd90a6d3dc2999b6284400f8177ff2a191a2e440d2c415df2539457c1c763a4c305bc9ce30d09e27623df84ae9c2a088f4be6c3e83eca89bf1116912936e17d76491b41357f5c336a647861aa5e0f69139b5a99ebf96f36bd8857f1592dad594902d78f3532931d01390fb9a5a5cb6c1ba13bec8a6b3d066ca1a0e56978f409b60fc7527d7815ad4442356973ee7a8ee1ef6ab67a0ff8d2d54ac96b5e094a299d65a4117f5d191737aa283833c0d76d553a069c87643041431a4dce29f0c144c4152dc273", &(0x7f0000000180)="611db57955f20c535105ca227c1d3d7940ea177e8afa82f76f43c7d3867670fe5db3516225c4fd8e57c0a5feb7dff3be0381f7a9d1d7560318fa342be4f708ab4ebcee271dab201e0c41b07464cb81bd94c603", 0xd5, 0x53}) [ 1325.849874] device bridge_slave_0 left promiscuous mode [ 1325.864943] bridge0: port 1(bridge_slave_0) entered disabled state [ 1325.959228] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}]}) [ 1326.071216] team0 (unregistering): Port device team_slave_1 removed [ 1326.105531] team0 (unregistering): Port device team_slave_0 removed 07:40:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f01727468"]) 07:40:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1326.165979] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1326.223731] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1326.412266] bond0 (unregistering): Released all slaves [ 1326.529012] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1327.288261] bridge0: port 1(bridge_slave_0) entered blocking state [ 1327.294736] bridge0: port 1(bridge_slave_0) entered disabled state [ 1327.302622] device bridge_slave_0 entered promiscuous mode [ 1327.345692] bridge0: port 2(bridge_slave_1) entered blocking state [ 1327.352588] bridge0: port 2(bridge_slave_1) entered disabled state [ 1327.361574] device bridge_slave_1 entered promiscuous mode [ 1327.404519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1327.445535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1327.588013] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1327.634978] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1327.680216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1327.687542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1327.819400] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1327.826524] team0: Port device team_slave_0 added [ 1327.860462] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1327.868293] team0: Port device team_slave_1 added [ 1327.911546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1327.948810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1327.979079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1327.986118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1327.995363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1328.020775] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1328.028454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1328.038664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1328.326669] bridge0: port 2(bridge_slave_1) entered blocking state [ 1328.333071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1328.339734] bridge0: port 1(bridge_slave_0) entered blocking state [ 1328.346079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1328.353334] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1328.537432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1329.315232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1329.407224] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1329.500944] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1329.507095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1329.515026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1329.609682] 8021q: adding VLAN 0 to HW filter on device team0 07:40:30 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0xff00000000000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xb3, 0x20000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x2, 0x5, 0xffffffff, 0x4d7, 0x9d00000000000000}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x1, 0x8, 0x100, 0x7, r1}, &(0x7f0000000280)=0x10) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wan,_extra_isize'}}]}) 07:40:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x300000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1330.162178] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1330.181963] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1330.236141] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1330.241785] EXT4-fs: 20 callbacks suppressed [ 1330.241795] EXT4-fs (sda1): Unrecognized mount option "debug_wan" or missing value [ 1330.271470] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1330.278694] EXT4-fs (sda1): Cannot specify journal on remount 07:40:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x600000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1330.330586] EXT4-fs (sda1): Unrecognized mount option "debug_wan" or missing value [ 1330.340355] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:30 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0xffffffff00000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want\nextra_isize'}}]}) [ 1330.382835] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:30 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000540)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = memfd_create(&(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x5) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000300)={0x1000000000000, 0x7ffb, 0x1}) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x80) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683f2e0001000065302c00"]) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000180)=0x30) getsockopt$inet6_dccp_buf(r2, 0x21, 0x0, &(0x7f0000000480)=""/70, &(0x7f0000000500)=0x46) r4 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x490102) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000600)={@loopback, 0x0}, &(0x7f0000000640)=0x14) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000680)=r5) statx(r4, &(0x7f0000000000)='./file0\x00', 0x6000, 0x200, &(0x7f0000000380)) 07:40:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1330.515301] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1330.524552] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1330.540342] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1330.550645] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:30 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x5000000, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2c000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1330.655513] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 1330.655513] extra_isize=0x0000000000000000" or missing value [ 1330.677092] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:31 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0xff00, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1330.704928] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1330.765337] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 1330.765337] extra_isize=0x0000000000000000" or missing value 07:40:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x5c1080, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000380)={0x7, 0x1b, 0x2}, 0x7) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000400)={0x0, 0x1, {0x5, 0x3, 0x755, 0x8da4}}) r3 = getgid() fchownat(r1, &(0x7f00000001c0)='./file0\x00', r2, r3, 0x800) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r4 = socket$inet(0x2, 0x0, 0x7) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000100)=0x5) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1330.832749] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want"extra_isize'}}]}) 07:40:31 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x2, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1330.898074] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1330.900844] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1330.931049] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1331.029800] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 1331.053990] EXT4-fs (sda1): Cannot specify journal on remount [ 1331.073864] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 07:40:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1331.158129] EXT4-fs (sda1): Unrecognized mount option "debug_want"extra_isize=0x0000000000000000" or missing value [ 1331.168503] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:31 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) syz_mount_image$ext4(&(0x7f00000001c0)="658f743200", &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, &(0x7f0000002840)=[{&(0x7f0000000440)="91827d717619236e3b4dee1b5ed5292aae75f60a86f2033b1499d2bc34a5f321914842662e23345b35c30b514c088ae5d7c4e7e21206d36fbbe154b1dacb8d1ed1d56e01eda4ca4814c2be17b8a7a0b88cb4b82ff73087184540c849316a837c6fc9818abf69135128e85c55ce86aae3b11d5bb40967d30841ced2bc9cf5b05914a809b7d075bf4a3984065d45056b08a9a1aa65150fccd69ad58c7a1b700ff1cd289b37b0e816ee3df4", 0xaa}, {&(0x7f0000000500)="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", 0x1000, 0x3}, {&(0x7f0000000200), 0x0, 0x8}, {&(0x7f0000001500)="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", 0x1000, 0x6}, {&(0x7f0000002500)="1022c186488e732457658d1ed59541a5e35b44e8a6617561eaa0a88e80564f94dc9acddb242a313e5fd087d000770d0475ccee2a3c42e48fe92e53ab43716938de08078ea11a967a54697864cc490137105ca6fca21bab23bd3a95ba446f4a92a282dc8c801eb306e6141a222e318e073a0c9e9243a984bed0c2e5cfd2ead6515f2c469a80408313336f5aefe9639e07098e66f0baac6ecdc62b48ceb219c5924bbf922c82f87772529d72fb77bef8a1", 0xb0, 0xffffffff00000000}, {&(0x7f00000025c0)="5c7fd0c8215842f9326e6b80a0276e8c6902cbefb55f3f18800eb244d74029b5ea463b4042b8d7edbf575559d9119884ff43442e74f00345448e5bc44668d946b94b41ff009889eee148de4831e0858a4bbf4dc94471ebf92e31cd578a9b107b7a4763c3d83d387951d3146639fc4481086513254a22fa57b03c8110c27d4373f51ccfd9d32673014b9cf0fafb271c4e", 0x90}, {&(0x7f0000002680)="2371259b8cf17f7aff3c7b1bf9b528f1d567c1010e6d380f664ed586e33ce39db6ffb0cd1061ae9aad42edf934029b1e6991258b9ff52fdc3c4abbbb6e8ed167fd44515ab5f1ea90beeb31409258ddaff56da7fff0d913b58dab77df36fb30c216270d144e2f98fb54a4f69708052e434240dea0dbfc0dba771da83de4847ea1558cc3391f2a2f0e880deb6363d0f4766aa3958a1022033479d2ab67b0243257227607f27d5187ef40eed162676db34331e9536264ab73dc155e17c976e673e18febf6f5f9311086ddd8b0e02dfede8f8c7ad1c9bf51b152de40373f87e395101d5764e6145d60", 0xe7, 0x9}, {&(0x7f0000002780)="93c4cb4b70028451ea881945d9b8b665200e5b10fe20355a50a3c57dfd7ef29a26eca8a9bab40eb048e4071d11105c9f988335bd0d22776f57d9b8f4cf2cd578197d6b9224dbff4ec17e227e4364063877670c93cd686f2edf5e2fe78d2c25a66dd96f8ce66cf12f45540922b87b41ca693956f210c3aa13964d4a47f0e629c99eb39ea3a82cc85415ad1676d3272510403ae1d58487249acccf9f47ef921435e3aae7f00d04bc325e9f6877f74f", 0xae, 0x3}], 0x100020, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [{@euid_eq={'euid', 0x3d, r0}}, {@uid_gt={'uid>', r0}}, {@subj_user={'subj_user', 0x3d, 'journal_path'}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x3c}}]}) [ 1331.275936] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1331.292660] EXT4-fs (sda1): Unrecognized mount option "debug_want"extra_isize=0x0000000000000000" or missing value 07:40:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x500}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:31 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1331.361393] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1331.390635] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want,extra_isize'}}]}) [ 1331.519030] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1331.528028] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1331.540929] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1331.551987] SELinux: security_context_str_to_sid(root) failed for (dev sda1, type ext4) errno=-22 07:40:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xedc000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1331.582612] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x108) 07:40:32 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000100", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1331.710167] EXT4-fs (sda1): Unrecognized mount option "debug_want" or missing value 07:40:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1331.758410] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1331.802696] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1331.820654] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1331.841466] EXT4-fs (sda1): Cannot specify journal on remount 07:40:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:32 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1331.872636] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wantlextra_isize'}}]}) [ 1332.024674] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1332.031441] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1332.059703] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1332.071516] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f75e96e616c5f706174683d2e2f66696c65302c00"]) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000001c0)={0x3, 0x8, 0x800, 0x8}, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x12000, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) getpeername(r0, &(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000200)=0x80) accept$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) sendmsg$nl_route(r2, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="580000001a0000002bbd7000ffdbdf250a3420020006ff0f000a000014000500fe8000000000000000000000000000bf14000500000000000000000000000000000000010c00090004000103f5a7c31c8a9ab78aa7df1acff0845a4e1b0c9276dbf327bcc05d05861af863472f02ebf8ca57d36e95894c971692af046110960f21e1d1136369707ffad73776a2c42f00abdb43076f8a02a79ba5253d38a534f439e88c2c9cb498ddf9d7672a0f471437d33020b0f2d807e2c25cbc0ae0bcc93f90592dfdbf2c2f7efae799e878629cbdb49e66f7c5a2f3129beba3000000009f04978e09b97daa", @ANYRES32=r3, @ANYBLOB="0800060009000000"], 0x58}, 0x1, 0x0, 0x0, 0x4040}, 0x5) 07:40:32 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x22000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1332.255676] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1332.366157] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1332.383860] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1332.393868] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:32 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x600}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1332.574452] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize'}}]}) 07:40:32 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:32 executing program 5: mkdir(&(0x7f0000000000)='\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$netlink(r0, &(0x7f0000000280), &(0x7f0000000200)=0xc) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1332.643637] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1332.669860] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x5}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1332.705019] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1332.749103] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x4, &(0x7f00000005c0)=[{&(0x7f00000002c0)="2ddf35571174e5494714586f07dbf4a9006497a0a32a4572490dde02f9e71f1a21d5b13cbfacb96f0ca7822cf2d8d11ab36d767339c07bb947aebaf2eac2bfe778c002d4bf3818cde99a437c515e2f0918008b9d573efc84029a03adc8014536df573ac3800e104974007a6a17f6ae0bc7a132ec28bff39f55e2c69762d4f384b0b9470e0126b05371662cac77f81cd00390289675b0bb6b978af610b118", 0x9e, 0x81}, {&(0x7f0000000380)="3427dbc2f8cd2295de4362a0f9fb62c49bbeabb979fa0cc8ed98836a508f509fa4ec19dbe5c262d3669d899d20041fca17931f0ba2944804ab9d7f8c517df445630f4eba87b52078e985b0f7fe8b9ffd5dedb3c3f39b7bb2a28b089f05dfa6a8baae808f34cdbe96281536f9905a6f95cbe7280391bacbd19b6c1cef31", 0x7d, 0x1}, {&(0x7f0000000400)="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", 0xfd, 0x7}, {&(0x7f0000000500)="0c97395b32465182e23efcdbfeab62a9b5878b557c7fb401cb2718bc859fbcd64c84081cd64c40272cc8334b5f66768d52afb3dff2588c1de39696d79cf6a7710058d0e14f9126d2f79465ac2e90f31f5bc01d1150d0091bb76c647eec29a35cb9629571ae248893f979612a8fe514532d7050c409d855cccf77c66cb27275698980f85f9b05faf177f76258eee4fa1e5bd11748ef5a9f36a4fb58875cf195bebaf1e55e6999bb765cb01f94c92d161743093951ffdef9e7445e0ca11a85", 0xbe, 0x8}], 0x0, &(0x7f0000000640)={[{@nossd_spread='nossd_spread'}, {@rescan_uuid_tree='rescan_uuid_tree'}, {@barrier='barrier'}, {@subvolid={'subvolid', 0x3d, 0x7fffffff}}, {@space_cache_v1='space_cache=v1'}, {@notreelog='notreelog'}, {@subvolid={'subvolid', 0x3d, 0x7}}, {@nodatacow='nodatacow'}, {@noautodefrag='noautodefrag'}], [{@audit='audit'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@seclabel='seclabel'}, {@dont_hash='dont_hash'}, {@hash='hash'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@obj_role={'obj_role', 0x3d, 'journal_path'}}, {@smackfshat={'smackfshat', 0x3d, '}'}}, {@hash='hash'}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x2000000, &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="70074ef5124133687640a0283c3d996fd0525bb2a6efa78728058ebf0d6dd5a63bf33bfbcd3f4215f954", @ANYPTR], @ANYPTR64], @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYBLOB]]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1332.887611] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1332.894310] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1332.914859] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6b6b6b00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_"xtra_isize'}}]}) [ 1333.133978] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1333.158383] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1333.185051] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400801, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x3c, @empty, 0x4e21, 0x4, 'wlc\x00', 0x0, 0x2, 0x60}, 0x2c) 07:40:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1333.405831] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1333.424356] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1333.466173] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1333.473337] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:33 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "9000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}]}) [ 1333.686024] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1333.701784] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) unlinkat(r0, &(0x7f00000001c0)='./file0\x00', 0x200) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x700}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:34 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1333.842835] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1333.873626] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x60}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_,xtra_isize'}}]}) [ 1333.952249] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1333.991964] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:34 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1334.038625] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1334.059822] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1334.181499] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:34 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1334.228551] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1334.256930] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1334.297920] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8cffffff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:34 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1334.386504] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1334.411877] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_lxtra_isize'}}]}) 07:40:34 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="6a6f75726e9537896e6174683d2e2f66696c65302c005e40fbb38278212c0b2cf41ee58a2f623a989b056318f6f5aa599ff78bddb866486a424c875acf5542e936e2c6653352d98efec5d66a34bf20e779f64db94b5c914317ad30d672e6cd8ff3a5ef87d48301deb3d76029892e0ee0cb7ea6b266a4212375ccde23a64cfa5b273a36ea5e82bb376ef605dac7044b80fc11ffa55daefff336f0168ed29ea784f48ce6a2aa6e5372f06a9a07927b6244b2d025f38f09e3d50f07b5faad19872a638352f7009ff77b52633ddec06a"]) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) fstat(r0, &(0x7f0000000380)) [ 1334.528131] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1334.541584] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1334.553603] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2200}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1334.660786] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1334.747170] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1334.776169] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:35 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1334.809502] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x3}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_e\ntra_isize'}}]}) [ 1334.888697] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000004c0)={0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4200, r1, 0x37, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [{@obj_user={'obj_user'}}, {@smackfsroot={'smackfsroot'}}, {@appraise_type='appraise_type=imasig'}, {@dont_hash='dont_hash'}]}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x20000, 0x0) sendto$llc(r2, &(0x7f0000000280)="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", 0xfb, 0x0, &(0x7f00000001c0)={0x1a, 0x33f, 0xefd3, 0x8, 0x8, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) fchdir(r2) fallocate(r2, 0x0, 0x800000000000007, 0x5) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x1, 0x0) ioctl$KDMKTONE(r3, 0x4b30, 0xb633) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000400)={'filter\x00', 0x60, "b2296b5e6b41642a2c5b0d1d75c4fe59e69642d6694747fc5ab526e8118f28ffa4e911e61f82603b18f12e0ff953e5b1f51f15bf2184cc2bd05215420a704824f2e5243081bdabdcb808b83712743669a1badec2372221617216f4d052e3d314"}, &(0x7f0000000200)=0x84) [ 1334.956782] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1335.022277] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:35 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000000100", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1335.070325] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xffffff8c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_e"tra_isize'}}]}) [ 1335.256685] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1335.312374] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1335.323574] EXT4-fs: 25 callbacks suppressed [ 1335.323583] EXT4-fs (sda1): Cannot specify journal on remount 07:40:35 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0xc0a81, 0x0) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x7, 0x8000) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000001c0)={0x6, r2, 0x1}) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="6a6f75716e616c5f706149144371d5e25674683d2ef7760051c0f6d75f2f66696c65302c00"]) socketpair$inet6(0xa, 0x6, 0x82, &(0x7f0000000080)) [ 1335.409358] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1335.435454] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc0ed0000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1335.511347] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1335.533016] EXT4-fs (sda1): Unrecognized mount option "debug_want_e"tra_isize=0x0000000000000000" or missing value 07:40:35 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1335.660897] EXT4-fs (sda1): Unrecognized mount option "debug_want_e"tra_isize=0x0000000000000000" or missing value [ 1335.681454] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1335.684095] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1335.709498] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:36 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1335.732877] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_e,tra_isize'}}]}) [ 1335.833563] EXT4-fs (sda1): Unrecognized mount option "jouqnal_paICqÕâVth=.÷v" or missing value [ 1335.880714] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1335.903488] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1335.904505] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:36 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "7fffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1335.939013] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1335.952326] EXT4-fs (sda1): Unrecognized mount option "jouqnal_paICqÕâVth=.÷v" or missing value 07:40:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x400000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:36 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:36 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80000, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000280)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1336.057078] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1336.072505] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1336.099119] EXT4-fs (sda1): Unrecognized mount option "debug_want_e" or missing value [ 1336.154381] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1336.185850] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:36 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1336.206205] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1336.239196] EXT4-fs (sda1): Unrecognized mount option "debug_want_e" or missing value 07:40:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xffffffff00000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ex\nra_isize'}}]}) [ 1336.330193] EXT4-fs (sda1): Cannot specify journal on remount [ 1336.365508] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1336.410266] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1336.448978] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1336.459283] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:36 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "feffff0700", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x5000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1336.492996] EXT4-fs (sda1): Cannot specify journal on remount 07:40:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a0000000065302c000000000000e4ffffffffffffff"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x101000, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) utimensat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)={{r1, r2/1000+30000}}, 0x100) [ 1336.649882] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 1336.649882] ra_isize=0x0000000000000000" or missing value [ 1336.690850] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:37 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000000ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1336.732368] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1336.773384] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ex"ra_isize'}}]}) [ 1336.958481] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:37 executing program 5: socket$l2tp(0x18, 0x1, 0x1) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005840)={0x0, 0x0}, &(0x7f0000005880)=0xffffffe1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) syz_mount_image$f2fs(&(0x7f0000000100)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x8001, 0x2, &(0x7f0000000380)=[{&(0x7f00000001c0)="26ecb1fc3b270c1cdb106b1c07d73ba26e65a9766956914116e92dcf3ce3846f7e9852b31f72b4a82675f4a930e632437d108c97a10b906ddd705303edb28005ed7e0d55bdb52cad27542a170b27aedb6a3f06dd85c078b1fe7e34a1956ca8b2092ddf0530dff845", 0x68, 0xffff}, {&(0x7f0000000280)="82a073019262c57d5ee2e4fd517200ec5ac8344ba8cb9d83011734d5c2e614dc6922e14e95d8dc1d8a1d53115b38c6b947c9ecb8971a68ea5cae5dffbd1717b85c81fa33a20dd0c5e20eeb41dee6a49b3c66f784b0ff7ffbed1e25e441a68d1be53e00466f7240d37d2862101df4689226523766d353d176d5430d4788285ab68f5e460e03813f767a88b3c50fd9c99f8f324d1fe1a739989e2b04fcb100a68c566d6fa817df15d41222df527079f681319ccb97cbc8a836e73c11a250a2b4af7182520f2c053acbaff382da29ecae6fa645017f", 0xd4, 0xfd6}], 0x1000, &(0x7f0000000440)={[{@noflush_merge='noflush_merge'}, {@noextent_cache='noextent_cache'}, {@noinline_dentry='noinline_dentry'}, {@whint_mode_off='whint_mode=off'}, {@fsync_mode_strict='fsync_mode=strict'}, {@background_gc_off='background_gc=off'}], [{@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef', 0x3d, ','}}, {@obj_user={'obj_user'}}, {@euid_eq={'euid', 0x3d, r1}}, {@subj_role={'subj_role', 0x3d, 'ext2\x00'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000005980)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x9, 0x1f, 0x94, 0x12d, 0x18}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000002a40)={r2, 0x401, 0xffffffffffffffa1}, &(0x7f0000002a80)=0x8) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) recvmmsg(r0, &(0x7f0000005640)=[{{&(0x7f00000003c0), 0x80, &(0x7f0000002e40)=[{&(0x7f0000002ac0)=""/85, 0x55}, {&(0x7f0000002d80)=""/131, 0x83}, {&(0x7f0000002b40)=""/109, 0x6d}, {&(0x7f0000002a00)=""/10, 0xa}], 0x4, &(0x7f0000002e80)=""/122, 0x7a, 0xb1d}, 0x8000}, {{&(0x7f0000002f00)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003480)=[{&(0x7f0000002f80)=""/222, 0xde}, {&(0x7f0000003080)=""/205, 0xcd}, {&(0x7f0000003180)=""/13, 0xd}, {&(0x7f00000031c0)=""/52, 0x34}, {&(0x7f0000003200)=""/179, 0xb3}, {&(0x7f00000032c0)=""/246, 0xf6}, {&(0x7f00000033c0)=""/189, 0xbd}], 0x7, 0x0, 0x0, 0xffffffffffff77fb}, 0xff}, {{&(0x7f0000003500)=@nfc, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003580)=""/180, 0xb4}, {&(0x7f0000003640)=""/64, 0x40}, {&(0x7f0000003680)=""/150, 0x96}, {&(0x7f0000003740)=""/75, 0x4b}], 0x4, &(0x7f0000003800)=""/127, 0x7f, 0x20}, 0xc49}, {{&(0x7f0000003880)=@pppol2tpin6, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003900)=""/102, 0x66}, {&(0x7f0000003980)=""/105, 0x69}, {&(0x7f0000003a00)=""/117, 0x75}, {&(0x7f0000003a80)=""/65, 0x41}, {&(0x7f0000003b00)=""/116, 0x74}, {&(0x7f0000003b80)=""/181, 0xb5}, {&(0x7f0000003c40)=""/55, 0x37}, {&(0x7f0000003c80)=""/95, 0x5f}, {&(0x7f0000003d00)=""/11, 0xb}, {&(0x7f0000003d40)=""/88, 0x58}], 0xa, &(0x7f0000003e80)=""/75, 0x4b, 0x400}, 0x3}, {{&(0x7f0000003f00)=@alg, 0x80, &(0x7f00000042c0)=[{&(0x7f0000003f80)=""/165, 0xa5}, {&(0x7f0000004040)=""/14, 0xe}, {&(0x7f0000004080)=""/141, 0x8d}, {&(0x7f0000004140)=""/165, 0xa5}, {&(0x7f0000004200)=""/164, 0xa4}], 0x5, 0x0, 0x0, 0x1}, 0x5}, {{&(0x7f0000004340)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f00000055c0)=[{&(0x7f00000043c0)=""/4096, 0x1000}, {&(0x7f00000053c0)=""/250, 0xfa}, {&(0x7f00000054c0)=""/143, 0x8f}, {&(0x7f0000005580)=""/11, 0xb}], 0x4, &(0x7f0000005600)=""/34, 0x22, 0xff}, 0x8}], 0x6, 0x21, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10020, &(0x7f00000058c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [{@seclabel='seclabel'}, {@uid_eq={'uid', 0x3d, r1}}, {@subj_user={'subj_user', 0x3d, 'selinuxbdevkeyring'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'whint_mode=off'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'journal_path'}}]}) lsetxattr$trusted_overlay_upper(&(0x7f00000057c0)='./file0\x00', &(0x7f0000005800)='trusted.overlay.upper\x00', &(0x7f0000005a40)={0x0, 0xfb, 0xea, 0x2, 0x1, "44a0a10b694ee1d15bade930b9eba25b", "af43dc4a07f2c02e561bcd040fece7b18747a360a969760a36df4e4adde81d61eccc121e3a10741517022718f2d5babb06861e7339412b9194ae3924d262ff811704cfd9fd1e9d0122f816592b0dd208e8d5ea09e622604ab62ebfc95a8a22c51b85e3e18a980843ea9d20c7701ecd8a4bcee3722b29e6d21002df648a55809972e651d6da08177ac224ecac5cee15a1d8d54733c0433dd8105e9e7b11254a315fac260cf5ed43403a4a7aa20ade6ecaaa4e6ee26e3f8801815f2325fc0ca57761f233f8b4a5832fba241f62bc4e3be20ccff59cc6"}, 0xea, 0x1) syz_mount_image$iso9660(&(0x7f0000000500)='iso9660\x00', &(0x7f0000000540)='./file0\x00', 0x1f, 0x8, &(0x7f0000002940)=[{&(0x7f0000000580)="19a180d9c637e555aa1b15458fccd029b1ec293eb06bbc97d80174dc1ce45c123f08180ca8a2b1f1cfacb266d9c963e8357867e95d180afed4789c61ebdda1497ff2344fc06db9ccb3e4b7fbcde1da425dac57c086c6b551b2f026463b38bed1802f21cd14900058f1ec1415bf19e0dde1f2696a373bdd236e79baafed30ce4406ac86851c0cf85f6186784c38b3b5", 0x8f, 0xfffffffffffffffc}, {&(0x7f0000000640)="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", 0x1000, 0x3}, {&(0x7f0000001640)="bb970f7d49fde91e2d776eb445cbbbde0b007f432e9c44ee0d50687f33432b1fd47bb56deaff1c486e6ed397d164968bbca726a4e3888ef59bbff4aff87bbbd7581f252c22060f48c71153eeb1b5fc7f6625134c7435102ab65cb38349cd86c6c498251f6cbb1d1a89608bfa01ab17a183c768990e98dfc829bb4cd6dad91f4e3f9b218c08a31b12f74e75823d3cd9fe27453050ebafd2618f1c0d9822d1d2a6da037259b1bc76c888b033299f1e63094c591951ee6b50", 0xb7, 0x6}, {&(0x7f0000001700)="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", 0x1000, 0xb2da}, {&(0x7f0000002700)="7d2cba240076a0b6226e5b261f7bb69e090a7ba7e1669cf497b8a8041b954643b29a2875d596f2bee9f3251551eed9651b7a58b594976f", 0x37, 0x8}, {&(0x7f0000002740)="8f83f23613732f7af8526999bd9341f09289862b76e7304d1dcc05b15067faed2cb038b619d2df37b4bd9d647c2a7a935c0fd2abb2376042205f6b11a7e8b7c6eb26da97541e0db5af34aa397acf3619e5422c178b0bb2ccb3d3bd1443c01feba0d44d0bcc77408ce4438a6de65c", 0x6e, 0xffffffff}, {&(0x7f00000027c0)="b98e627f29921010ee37eea1c4f1929471b01d679400fad7c64f1c83f46016854fd16e17486b365f489228094f329447b35ebf3d3aa36e06803654dac556c6bd281ee1a56acd10321fc79c2c212ae0493acc2d1440d44bce0e397c01a7b32919c9502e305efc64883e797f7e4350c9443b40e0710e6e80129ffe2909c97578c0f4636733d172484d0a866016c251f555e6071e00824709e07e476dfb802727a0f8dd5dcbc4098aac6b8e8fd1607f7f69fc68bad04a4fa9ccf8fde7b708", 0xbd, 0xf7}, {&(0x7f0000002880)="88a67f197796667714de4256304f0ab1b9bcf794d7190ca5f5ff5f2ab7d3d562e309849fa006b440672a0dce8c9969749cf9a5a6caf58473c9b755c35263b74386e1524cfc1441ce994e7bed25fa2b19d300c4969430d68dc481fa3ad63dc1571979424da2369c5a75150e81fa391fa8af663f29122c4be7116f3e121e9f59a78a1a53d1eeec5fc8de164491ea425d091681ae828b56fc278806538ad8698155deca", 0xa2, 0xcd5790f}], 0x800, &(0x7f0000002bc0)=ANY=[@ANYBLOB='check=strict,norock,uid=', @ANYRESHEX=r1, @ANYBLOB="3bb082e07eea44348f0bc3e33cf3767fe535f2ee1b0cac4d81b018e6f158274b7b860e2d809b32f8b294519069a3d49c0d26cb7d9b71b548d9d33ee9d06f892556df800e5653006b1261b7e0e2bd1a3e621fa7c6782edb6edb5937a114d199ebea702c85f49a79302ee410335f8479bac2a80d41c8e13e0f7de0c89b0714761df9c3279d53819c8c86b574d557cfd373e33c8598a4a71014d56e1a05b89d244f488ebcf9b771f16d697c2da41ac3385413d4ab11345312ced0afb60616ebbda7afdb98d4962bf898905e4278bb5fffbdf968b5620f8b3ea052565528f1a2d348b7f214d175072e32886940b4ffa2b76c4ddfbef1ee6fdf5ec87b746780e288dbea", @ANYRESHEX=r1, @ANYBLOB=',block=0x0000000000000800,fsmagic=0x0000000000000008,permit_directio,\x00']) 07:40:37 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xfffffff6}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1337.041541] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1337.071116] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1337.251031] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:37 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1337.338743] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1337.349948] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x200000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1337.448750] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}]}) 07:40:37 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1337.564431] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1337.663709] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x4000, &(0x7f0000000180)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x20000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1337.778607] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1337.917705] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1337.966930] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:38 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ex,ra_isize'}}]}) 07:40:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)='./file0/file0\x00') mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x8002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) fsetxattr$security_evm(r0, &(0x7f0000000400)='security.evm\x00', &(0x7f0000000440)=@ng={0x4, 0xb, "388d32b7c3"}, 0x7, 0x2) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0x4057, "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", 0xd, 0x1, 0xffffffff, 0x9, 0x100, 0x9, 0x10001}, r1}}, 0x128) 07:40:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1338.077118] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1338.162206] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:38 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000000400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1338.221456] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x7000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ext"a_isize'}}]}) [ 1338.339548] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:38 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:38 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x3) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1338.506320] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1338.544635] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1338.573474] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1338.774545] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1338.804564] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:39 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netlink\x00') write$P9_RREADLINK(r0, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 07:40:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ext%a_isize'}}]}) 07:40:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x60000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1339.006677] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1339.028307] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1339.049032] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:39 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ext,a_isize'}}]}) [ 1339.198609] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) io_setup(0x9b, &(0x7f0000000100)=0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x50000, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0xe5, r1, &(0x7f00000001c0)="f1509214e006cd992ed98f57a668ae3bbc16e90deba0568eff3d3a15971c3e294c376986698668546fde31b9b34ec4059913655f102a9601adee2a1db61bf1b352ed6dda3b40e32ddb15b9f23f3cb349df27397bae775417e6596cfe82aba4f9", 0x60, 0x80, 0x0, 0x0, r2}, &(0x7f0000000300)) 07:40:39 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1339.322262] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1339.375431] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1339.394555] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6b6b6b00000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ext\na_isize'}}]}) 07:40:39 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1339.608780] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1339.614120] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1339.646023] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:40 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x3f000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10400, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000001c0)={r1, 0x6}, &(0x7f00000012c0)=0x8) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0x10, 0x7) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a7175726e616c5f706174683d2e2f66b0c43b3fec06"]) 07:40:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extr\n_isize'}}]}) [ 1339.804146] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:40 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000007fffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1339.929223] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1339.989295] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1340.062887] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x8000, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x80000) 07:40:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xf6ffffff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:40 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "07fffffe00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1340.258489] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1340.260311] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extr"_isize'}}]}) 07:40:40 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1340.305947] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1340.388036] EXT4-fs: 25 callbacks suppressed [ 1340.388046] EXT4-fs (sda1): Cannot specify journal on remount 07:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xedc0}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:40 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:40 executing program 5: mkdir(&(0x7f00000004c0)='./file0\x00', 0x180) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x7, 0x3, [0x9, 0x9, 0x3]}, &(0x7f00000001c0)=0xe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e23, 0x80000000, @remote, 0x5}}, 0x200, 0x0, 0x7f, 0x9, 0x20}, &(0x7f0000000200)=0x98) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r2 = socket$inet(0x2, 0x7, 0xffffffffffffff54) getsockopt$inet_buf(r2, 0x0, 0x0, &(0x7f0000000280)=""/219, &(0x7f0000000100)=0xdb) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) write$P9_RWSTAT(r0, &(0x7f0000000440)={0x7, 0x7f, 0x1}, 0x7) [ 1340.459508] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1340.521478] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr"_isize=0x0000000000000000" or missing value [ 1340.599950] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1340.630588] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:41 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000ffffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1340.661126] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr"_isize=0x0000000000000000" or missing value [ 1340.684539] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x3f00000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}]}) 07:40:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001004, &(0x7f0000000080)=ANY=[]) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) getresuid(&(0x7f0000000200), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x85000, &(0x7f0000000340)=ANY=[@ANYBLOB="6559bb4a4bc48c9514f689dad1c49eb7f7f5144821245a9b93", @ANYRESDEC=r1, @ANYBLOB=',context=system_u,fsmagic=0x0000000000000000,fscontext=staff_u,obj_role=cpusetusereth1}r![)trusted,\x00']) syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x400) creat(&(0x7f0000000080)='./file0\x00', 0x20) [ 1340.917434] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:41 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000007fffffe00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1340.998418] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1341.026649] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value 07:40:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1341.053126] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x500000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:41 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1341.143106] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1341.170652] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value 07:40:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extr,_isize'}}]}) 07:40:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/mls\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) r3 = getuid() syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="04e9df3efa3b26df16d2098698c10bb0dfec6261bf659ebc942f83d5f4a2e4c756e2f287facdc223", 0x28, 0x1}], 0x100000, &(0x7f0000000440)={[{@quiet='quiet'}, {@file_umask={'file_umask', 0x3d, 0x200}}, {@codepage={'codepage', 0x3d, 'maciceland'}}, {@umask={'umask', 0x3d, 0x1bac}}, {@file_umask={'file_umask', 0x3d, 0x2}}, {@umask={'umask', 0x3d, 0xfa}}, {@codepage={'codepage', 0x3d, 'iso8859-5'}}], [{@euid_eq={'euid', 0x3d, r0}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fowner_lt={'fowner<', r2}}, {@obj_role={'obj_role', 0x3d, 'ext2\x00'}}, {@hash='hash'}, {@euid_lt={'euid<', r3}}, {@smackfshat={'smackfshat', 0x3d, 'journal_path'}}]}) [ 1341.294103] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1341.330970] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6b6b6b}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1341.355970] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:41 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1341.525724] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1341.536531] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1341.555426] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr" or missing value [ 1341.559870] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:41 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000000000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x3000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1341.658396] EXT4-fs (sda1): Cannot specify journal on remount [ 1341.732485] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr" or missing value [ 1341.748683] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:42 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extrl_isize'}}]}) [ 1341.789862] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1341.826450] EXT4-fs (sda1): Cannot specify journal on remount [ 1341.828321] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x3f00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x400000000000000, 0xaaaaaaaaaaaac37, &(0x7f0000000100), 0x400, &(0x7f0000000180)) [ 1341.916204] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:42 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1342.038017] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1342.038485] EXT4-fs (sda1): Unrecognized mount option "debug_want_extrl_isize=0x0000000000000000" or missing value 07:40:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1342.111685] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2c00000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1342.170675] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1342.225725] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 07:40:42 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000000009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra,isize'}}]}) 07:40:42 executing program 5: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x7}, [{0x2, 0x0, r0}, {0x2, 0x2, r1}], {0x4, 0x5}, [{0x8, 0x0, r2}, {0x8, 0x3, r3}], {0x10, 0x1}, {0x20, 0x5}}, 0x44, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000840)={&(0x7f00000007c0)='./file0\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f0000000700)={@pptp={0x18, 0x2, {0x1, @multicast1}}, {&(0x7f0000000640)=""/107, 0x6b}, &(0x7f00000006c0), 0x20}, 0xa0) [ 1342.387588] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1342.412289] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1342.412819] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xffffff7f00000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:42 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0007fffffe00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extralisize'}}]}) 07:40:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1342.625970] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1342.651695] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1342.656888] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x700000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:43 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000180)=0x4572, 0x4) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f75726e616c5f70617400102e2f66696c65302c00"]) [ 1342.823478] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1342.842075] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:43 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1342.899713] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xffffff7f}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1343.021843] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:43 executing program 5: r0 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000880)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x80000) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='journal_path', &(0x7f0000000400)='*+cgroupposix_acl_access:wlan0\x00', &(0x7f0000000440)='bpf\x00'], &(0x7f0000000500)=[&(0x7f00000004c0)='ext2\x00']) getpeername(r0, &(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000280)=0x80) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getresgid(&(0x7f0000000000), &(0x7f00000002c0), &(0x7f0000000340)) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast2, @multicast1}, &(0x7f00000005c0)=0xc) sendmsg$xdp(r1, &(0x7f00000007c0)={&(0x7f0000000600)={0x2c, 0x7, r2, 0x38}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000640)="c04beaf08bf0c3eccc564d3b220c632d4c3bc9a3922500d449975b9e2b492b2c274f846bac463c7cd20e143e66aad27224ee86bd7329c1e55bde1a033fae96413dc2fbc8480c7fb5c501ac6ffdb0ed5ef986f076f32db7a46ba8d73458980cd7e41d6d299b4e1ae06aa2e380ab8d7102627964d0154f31cd9b1154acf1e2d001267776f4759dc429f34b80a47d764166389736e45bec213cf4202ac66fda2fc9329a", 0xa2}, {&(0x7f0000000700)="879c13cced3411db90d50bcfcdf662dd41554bf69105ae2de0080230f0654eda1e8515f601389d774d135d9af5e6ff95c2de1f1566a3477b4087162099892276d697a7425ec7e763623c9a610fe12e648b9b57eaef", 0x55}], 0x2, 0x0, 0x0, 0x3f4516888efcf8a1}, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000800)="1e0c43fa2cfc0f4c2ec23efa8f399b37d612738931e92fbd2afb42b23cb629542697f2a7edfdd2b3b46c3840c31ab195ea4a55033664c5ea1c1635a225372c99e654afc94a670cc0") mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra\nisize'}}]}) 07:40:43 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1343.154232] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1343.199315] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x22}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1343.552499] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) socket$xdp(0x2c, 0x3, 0x0) 07:40:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1343.612203] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra"isize'}}]}) 07:40:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x100000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1343.852788] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1343.890547] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB='journal_path=./f\x00\x00e0,\x00']) 07:40:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:44 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000000000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_\nsize'}}]}) [ 1344.116871] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1344.146775] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xf6ffffff00000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r1, 0xffffffff) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x100020, &(0x7f0000000180)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r2 = dup3(r0, r1, 0x80000) write$selinux_context(r2, 0xfffffffffffffffd, 0x0) [ 1344.356228] IPVS: ftp: loaded support on port[0] = 21 [ 1344.404570] device bridge_slave_1 left promiscuous mode [ 1344.405351] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1344.411010] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.433058] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1344.479085] device bridge_slave_0 left promiscuous mode [ 1344.484594] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_"size'}}]}) 07:40:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1344.607517] team0 (unregistering): Port device team_slave_1 removed [ 1344.634573] team0 (unregistering): Port device team_slave_0 removed 07:40:44 executing program 5: mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="736f75726e614b5f70618c683d2e2f62696c65302c00eb1a5f4ffb855183c3bc3e770b140405af3a1b4724b50bca1b2d1bf026a00a4bd25c30485ca3f82d0900000000000000e02a27a055e6d44b6d89ee064f0fa69accec76fbd0d3bbe988d5bd4c468f74cc8a535d8bc7f57d319b78fc083c809997b201043f81c8f77884d6e09f8d3634630e8013e1ed8154c7ab9ef0b7e50f340832a793c14976f9ce4e386cac1c6d5007bf80742cbfdfcce110d01c7923e88307e9e29deb45410b7011bd2381944713ddd1420aeb8baf434d223a59df4fd38fe4df529765e96f3e4385c47700"]) [ 1344.653176] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1344.717180] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1344.850247] bond0 (unregistering): Released all slaves 07:40:45 executing program 5: mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000380)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x8000}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000440)={r1, 0x6}, &(0x7f0000000480)=0x8) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'trusted.', 'self\x00'}, &(0x7f0000000200), 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x100, 0x513000) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") rmdir(&(0x7f0000000100)='./file0\x00') 07:40:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_,size'}}]}) 07:40:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1345.271258] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1345.322514] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1346.045913] bridge0: port 1(bridge_slave_0) entered blocking state [ 1346.052806] bridge0: port 1(bridge_slave_0) entered disabled state [ 1346.060685] device bridge_slave_0 entered promiscuous mode [ 1346.105212] bridge0: port 2(bridge_slave_1) entered blocking state [ 1346.111762] bridge0: port 2(bridge_slave_1) entered disabled state [ 1346.119581] device bridge_slave_1 entered promiscuous mode [ 1346.162188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1346.204640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1346.331117] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1346.376415] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1346.539623] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1346.546986] team0: Port device team_slave_0 added [ 1346.588220] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1346.595554] team0: Port device team_slave_1 added [ 1346.629905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1346.658983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1346.686980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1346.694490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1346.702815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1346.736600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1347.015555] bridge0: port 2(bridge_slave_1) entered blocking state [ 1347.021962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1347.028629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1347.034967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1347.042293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1347.981523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1347.997715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1348.082591] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1348.173037] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1348.179548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1348.186538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1348.280427] 8021q: adding VLAN 0 to HW filter on device team0 07:40:49 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000ffffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2eb2fcb2277f29632f66696c65302c0085c7818ed431d2199620f804cffabdefcc986918a2f48ac20a4ac3d7158c33b5153b905da8b7b48ec26e834c114d9c54a996d9ff280c2e6c75c46282fc99d40f8a03c0ae22"]) 07:40:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_lsize'}}]}) [ 1348.849036] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1348.858874] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1348.937421] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1348.951265] EXT4-fs: 21 callbacks suppressed [ 1348.951275] EXT4-fs (sda1): Cannot specify journal on remount 07:40:49 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000000000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1348.991407] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1349.003289] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1349.015336] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8cffffff00000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1349.047789] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_lsize=0x0000000000000000" or missing value [ 1349.107952] EXT4-fs (sda1): Cannot specify journal on remount [ 1349.168857] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1349.203262] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB='jourlal_path=./fle0,\x00']) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1349.211067] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_lsize=0x0000000000000000" or missing value [ 1349.222302] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}]}) [ 1349.277128] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:49 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "007fffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2c00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:40:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1349.436117] EXT4-fs (sda1): Unrecognized mount option "jourlal_path=./fle0" or missing value [ 1349.524300] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:49 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1349.566712] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1349.568125] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 07:40:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1349.619909] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1349.656331] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x300}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1349.680405] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1349.697818] EXT4-fs (sda1): Unrecognized mount option "jourlal_path=./fle0" or missing value [ 1349.734799] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1349.766461] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 07:40:50 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x1) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1349.849068] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1349.858551] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}]}) 07:40:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x22, {'user_id'}, 0x2c, {'group_id'}}) [ 1349.983128] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:50 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1350.067989] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1350.088264] EXT4-fs (sda1): Cannot specify journal on remount [ 1350.110430] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1350.179019] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 07:40:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x47, {'user_id'}, 0x2c, {'group_id'}}) [ 1350.229911] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1350.271799] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r0 = open(&(0x7f00000001c0)='./file0\x00', 0xa0000, 0x9) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x6, {0x10, 0x3, 0x6}, 0x1ed, r1, r2, 0x100000000, 0x5, 0x9, 0xfff, 0x1, 0x101, 0x7039, 0x200, 0x9, 0x100000000, 0x8001, 0x0, 0x100000001, 0x5, 0x608224b1}}, 0xa0) r3 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x4000) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000180)={0x8000, 0x7, 0x7f, 0x204}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:50 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1350.364563] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1350.396585] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}]}) 07:40:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x58, {'user_id'}, 0x2c, {'group_id'}}) 07:40:50 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1350.479582] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1350.496109] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1350.661605] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1350.693457] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1350.714458] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1350.729044] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'Xser_id'}, 0x2c, {'group_id'}}) 07:40:51 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}]}) 07:40:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:51 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1350.954340] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1350.969918] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1351.011819] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1351.080659] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'xser_id'}, 0x2c, {'group_id'}}) [ 1351.126077] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:51 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000007fffffe00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1351.167928] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1351.315434] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1351.342378] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1351.343569] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000180), 0x4) 07:40:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i\nize'}}]}) [ 1351.392584] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'lser_id'}, 0x2c, {'group_id'}}) 07:40:51 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000000000400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1351.674068] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2000, &(0x7f0000000480)=ANY=[@ANYBLOB="7d646c70cd0bab7760f6fe082405cb84827086c694a8bba693a4c3f8a72ea9f966b08836fd7a45814b37c8d37c0f776b4e87c1202add71d853549d1b2d6494671d9c94ec92642a7e9adf0401da013c4a998d1419126384ac4a68a737263bfeb5f372f77612c2a68ea8957a165616ae1b91cae9c5a4f202047c1f02412001ddda395b0dddaa2fd4a6d5c9e091944ad102666e702a920dd16e6a70e6fdd7d809df63467beefc8f74e2260f2b622ced5412bb77f39012c4bb218ffa8284793968dcecf1a8bb361032e5161126b3533cd42cd9d2ff60f7f142592a0ea821ec993ed498144072ab64d2dacf16", @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYBLOB="78dc1043eb74a1da57459d6b5d2ec3b386722bcb0d14e2653eff34daec8eca51be5154ccdd95ae380f19a8998ca2fbf3a90b38c347cf3bcff7f8469ce8c81cb2c2b6474416eba34f9cd37964a934c70817aa8a62d8d64484a05625bf75d1c9ab1f59cc208a3f805944fd7eb27625e32afe0c18b8b5e04f8fba57f4984165d1a0bd6bcebdc9309c756357305d8bdcf36d1a34f06844f116513a756e586e83918ad0de6b516a3f1bf448799919c33e6780cb7f5e3b2a8d152834928a68", @ANYPTR64, @ANYRESOCT, @ANYRES64], @ANYPTR, @ANYRES16, @ANYPTR64]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e2f661a9f65302c00"]) [ 1351.720283] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1351.740127] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1351.753444] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'iser_id'}, 0x2c, {'group_id'}}) 07:40:52 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}]}) 07:40:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1351.983871] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1352.005095] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1352.018145] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="6a6f75726e616ca114dd779f900020fb350eaea92d512d939f02bf0d748778f22ff7981e239e2038aa9a6b2f1a7d5482c2b1a34a2548c501594846471c5230fd89453442333899dff54c985e9ace2834ae0bc76df33cc3417b6f016fe0da285f4f2d188f27d8cb029f77574d21"]) r0 = shmget(0x1, 0x1000, 0x20, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) [ 1352.060474] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:52 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'sser_id'}, 0x2c, {'group_id'}}) 07:40:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i"ize'}}]}) 07:40:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:52 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1352.291360] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1352.299889] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1352.308908] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1352.322632] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'%ser_id'}, 0x2c, {'group_id'}}) 07:40:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x600200, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x4}) [ 1352.424572] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1352.499528] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {',ser_id'}, 0x2c, {'group_id'}}) [ 1352.540025] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1352.550367] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}]}) 07:40:53 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1352.698317] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1352.764409] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1352.776600] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000400)={[], [{@fowner_eq={'fowner', 0x3d, r0}}, {@audit='audit'}, {@euid_eq={'euid', 0x3d, r0}}, {@uid_lt={'uid<', r1}}, {@seclabel='seclabel'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL%#md5sum:^)'}}]}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000180)={0x0, 0xfffffffffffffffa, 0x103, 0x5, {0x81, 0x4, 0xbdb}}) 07:40:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'"ser_id'}, 0x2c, {'group_id'}}) [ 1352.811237] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:53 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000000000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}]}) 07:40:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1353.003127] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1353.019544] QAT: Invalid ioctl [ 1353.029634] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1353.042939] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'oser_id'}, 0x2c, {'group_id'}}) [ 1353.093228] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1353.166942] QAT: Invalid ioctl [ 1353.181998] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='xt>\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001500)=[{&(0x7f0000000180)="c7a429e9fd701ad6bc1d55cb6826a702b419b754398bf1d9f1011e04fe31a1b145e61ae34967f6bf8768daff36cef663e86775f0a866c7e4bcc2bf98e94a2ca20c7c3e1814a6deab7d3b2fe92a919c84314ee9e9f771b307ec7fe474a322d16ca9d25e29f331774185c4b223a8c7af19f560781f8fa255a1ef3e78f5", 0x101, 0x57}, {&(0x7f0000000380)="9a6c19fc79c5698de89ba36e10a21602b945d4e84535f9bbcc5de8a19387ea4e31177a737773d1f4b1c8b40563b3a5c0e8c1d314f26ab465ef80d6f4368eb1ea3c7ec62acb856f55628a206e769af633f61fc4bbda89cfefff332a75103def1c90c6d3447abc934d0ad78cb886fc371224a45baf", 0x74, 0xfffffffffffffffa}, {&(0x7f0000000400)="74f0f7511bb0879290f9000ad197a00e67a2a862677b5343f4fd5a20232175a1c71e0b9dfda89e17c4677b90cf3852060169a513da99182542e3a9f22a70ee59107a00a1d2d8289518668b99e04343b7edf6a1d05732fa5f3a644ac01da8920e4ceebb5a7fe46084dca09e77c567578b570e17778567413883b19a5826bae91a46061fd9fed7a06e583129036307acb53124385e059a53c723f2b3bbedd2248bfebfcd82ee5394bcd3a42388f43d9667d53a2102f5e8b3f7e81573131a6a65eba982558b81fdd7ebbaa8ec74eddb5ed10333d1d0e2b37a91eb04bd45571127671186018808bc23bfe7132d386f58c368e48a31", 0xf3, 0x7fffffff}, {&(0x7f0000000500)="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", 0x1000, 0x9}, {&(0x7f0000000080)="ffe6bfc2f20abf93921b131a61127b1ce354ae5a371ad5ef1693a5d2995b76a46b43c926974d7ed73ecc6b107a1c748f719a338e58dde4c9f7f75932a5d3", 0x3e, 0x8001}], 0x10001c, &(0x7f0000000280)=ANY=[@ANYPTR64]) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x13) 07:40:53 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000007fffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1353.237781] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'cser_id'}, 0x2c, {'group_id'}}) 07:40:53 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000000000100", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1353.285301] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}]}) [ 1353.435763] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1353.470836] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1353.471452] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:53 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0xa2200, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000180)={0x10, "6d1a8e1359adb96a198450eac1b76f79"}) 07:40:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'dser_id'}, 0x2c, {'group_id'}}) [ 1353.613884] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}]}) [ 1353.698868] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1353.725933] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1353.776794] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:54 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'pser_id'}, 0x2c, {'group_id'}}) 07:40:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0xa0001, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x20080, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@allow_other='allow_other'}], [{@smackfsdef={'smackfsdef', 0x3d, 'vmnet1)%{'}}]}}) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x2, 0x4300) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000180)=0x2) [ 1353.932889] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1353.959585] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1354.015978] EXT4-fs: 31 callbacks suppressed [ 1354.015990] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value [ 1354.054663] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1354.076054] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'\nser_id'}, 0x2c, {'group_id'}}) 07:40:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}]}) 07:40:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:54 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1354.294804] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1354.308233] EXT4-fs (sda1): Cannot specify journal on remount [ 1354.316725] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u+er_id'}, 0x2c, {'group_id'}}) [ 1354.378806] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value [ 1354.408899] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:54 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1354.461028] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1354.498232] EXT4-fs (sda1): Cannot specify journal on remount 07:40:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 07:40:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1354.573881] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value [ 1354.598647] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1354.631739] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1354.658743] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}]}) 07:40:55 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1354.690533] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'uier_id'}, 0x2c, {'group_id'}}) [ 1354.805609] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:55 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00feffff0700", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x44) write$P9_RREADLINK(r0, &(0x7f0000000180)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1354.970077] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value [ 1354.993128] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1355.012361] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u-er_id'}, 0x2c, {'group_id'}}) [ 1355.046319] EXT4-fs (sda1): Cannot specify journal on remount [ 1355.065268] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:55 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1355.108462] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value 07:40:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}]}) [ 1355.195651] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1355.202598] EXT4-fs (sda1): Cannot specify journal on remount [ 1355.218823] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1355.227957] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:55 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000340)={0x0, 0x43, 0x7, [0x80, 0x4, 0x3, 0x6, 0xff, 0x6, 0x7f]}, &(0x7f0000000380)=0x16) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e23, 0xffffffffffffffff, @empty, 0x4}}, 0x3, 0x2, 0x8, 0x9000000000000000, 0x1}, &(0x7f0000000480)=0x98) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x1, 0x200) fsetxattr$security_ima(r2, &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@md5={0x1, "8305eb77e7b36b2cb9b9f98b06dc9145"}, 0x11, 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x400, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@aname={'aname', 0x3d, '}vboxnet1procnodev'}}, {@privport='privport'}, {@uname={'uname'}}, {@access_client='access=client'}, {@loose='loose'}, {@afid={'afid', 0x3d, 0xc8c}}, {@access_any='access=any'}]}}) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1355.238564] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'uler_id'}, 0x2c, {'group_id'}}) 07:40:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1355.361729] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1355.387179] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1355.420960] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1355.453420] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 07:40:55 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1355.509288] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u"er_id'}, 0x2c, {'group_id'}}) [ 1355.682740] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1355.712264] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}]}) 07:40:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x6000, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRES64, @ANYPTR, @ANYRESHEX]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:40:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1355.733698] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1355.761991] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u,er_id'}, 0x2c, {'group_id'}}) [ 1355.844757] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000100", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1355.962751] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1356.029040] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1356.041941] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x9cf66a5084004bd4, 0x0) readlinkat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=""/240, 0xf0) io_setup(0xff, &(0x7f0000000080)) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00bb3800", &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4000, &(0x7f0000000380)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e2f66696c65302c00824a46c0bb2fd6adf09f89ec39dbd46678d90af0af16ad4d660197baa1e481e51185dcbc04378e90bd0a656f879086816867c2010ba7d84af51e4e579a14740843246e544046c263fe3afbf460124ca44d8a12185e31545d00661a0ed47a5a1dbf2d09ca2fd842f7997c2a37fd6cd376c4bc14ec1240f839dfbc31584300bb56628d3d5a47c3016dc00a4f5415c83ace0a849b1d767d1710e214bdf084f0420c1229675d6905d0fa9c6abe11f28b22ca24cd4d2469"]) 07:40:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1356.214196] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'uuer_id'}, 0x2c, {'group_id'}}) 07:40:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000000000ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:40:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i,ize'}}]}) [ 1356.404083] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1356.416010] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1356.434305] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:56 executing program 5: rt_sigsuspend(&(0x7f0000000100)={0x6}, 0x8) setxattr$security_ima(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@ng={0x4, 0x8, "9470b111e24d128f6bb724e42f23b229"}, 0x12, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001400)=ANY=[@ANYRES32, @ANYBLOB="568c366514bebf87680089a63229c6e872faba24dd38051c3240f25849508d93632e56182ad3134989dda690e9d8b764bee83ec71b98c7e61cbcc9506f24df82c757735484dac5a2b6ccb609ddbf26fa9728a47bdd9b8a3328da808a59", @ANYPTR, @ANYRES32, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESHEX], @ANYRESHEX, @ANYRES16, @ANYRES64, @ANYRES64, @ANYRESDEC=0x0, @ANYRESDEC, @ANYRES64]]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = semget$private(0x0, 0x3478bdeafd450435, 0x80) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000400)=""/4096) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f00000001c0)={0x5, {0xdfb, 0x80000000}}) 07:40:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1356.449961] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u0er_id'}, 0x2c, {'group_id'}}) 07:40:56 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1356.531099] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1356.629267] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}]}) [ 1356.687179] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1356.701471] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'uXer_id'}, 0x2c, {'group_id'}}) 07:40:57 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000000000000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1356.917186] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'uoer_id'}, 0x2c, {'group_id'}}) 07:40:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1356.959296] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1357.024784] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:40:57 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1357.099387] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1357.109060] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}]}) 07:40:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) clone(0x0, &(0x7f0000000280)="5d6f24f9cf02d384a35eeea6f086ed81aa3aba867e44abc87d7797c73fed6d155c50e5fe549413c24f119592c85e986c28bc5b73bfe0bd8ee9336d5f3546aaa0952e8e4b2826092590ff501864c08ca5efc560f0bb84a40b5dd05c0f5719db7875b4be8bc31425da963d7be3c4f256d0b2a1d2fd1c76b530532facc5ce0d0da180766f4e51098f45a2cdde62e74c66f4bf05ac3f35dca3163b3285031e79a87aa23dd58a6466ef82923bbdf916efe88e58012e74767a0548441b65a2547e0feff1b190c6280c271a48d4b1b21f8d36a3722308d052456ab7aa127e74b1bb", &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000380)="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") r0 = shmget(0x1, 0x4000, 0x480, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_RMID(r0, 0x0) 07:40:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'uxer_id'}, 0x2c, {'group_id'}}) 07:40:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}]}) 07:40:58 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1357.676956] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1357.688673] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u#er_id'}, 0x2c, {'group_id'}}) 07:40:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_islze'}}]}) [ 1357.991599] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1358.012976] IPVS: ftp: loaded support on port[0] = 21 [ 1358.062522] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u%er_id'}, 0x2c, {'group_id'}}) 07:40:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$UHID_INPUT(r0, &(0x7f0000000280)={0x8, "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", 0x1000}, 0x1006) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x121000, 0x0) 07:40:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1358.257997] device bridge_slave_1 left promiscuous mode [ 1358.280078] bridge0: port 2(bridge_slave_1) entered disabled state 07:40:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1358.349172] device bridge_slave_0 left promiscuous mode [ 1358.360402] bridge0: port 1(bridge_slave_0) entered disabled state [ 1358.384065] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_is\nze'}}]}) [ 1358.492709] team0 (unregistering): Port device team_slave_1 removed [ 1358.532852] team0 (unregistering): Port device team_slave_0 removed [ 1358.551510] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1358.604190] bond0 (unregistering): Releasing backup interface bond_slave_0 07:40:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:40:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) fstat(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) syz_mount_image$ext4(&(0x7f0000001700)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaadca, &(0x7f0000001640)=[{&(0x7f0000000280)="a5c7597b01491332a3cf58a16b8626ba3917928c2f39940e8a49179ad9c490422587dca2a3a02f2769ddfb068f454d1930c7fae63982c347c2aed921488eea6addd67afb47c77ac5f1fe858c35d2751f2591119c4a030a1ed4c7aa5607231b7077422808e5c4cddf8e3e40a45b4bef1df1086ee317c1a7258281cab31117a805e99c944fa0f5d594c1d418e47ffec0b3d67e212a89ae2bf1886a39e78e7320c011f2c8661dc61b48cf8a6a16c2eed972bc2cdca2f58c46a774b38d3d91914150412c34953db9c71fc90f94820e1e0c39c43bcd4cf12a2ecb25ba8a55f2af02054a2f71f7cd33daff829848147e111cf1873b40741e4d2eec3cceb3a56a", 0xffffffffffffff7a, 0xfffffffffffffffd}, {&(0x7f0000000180)="bcecf5e6740618578238e9fd3dabe6268e14f87c1610e193e7237a719ab1ebd21833e6792a520f68419303650db26d3d78278ec5cf3245fb768e4de4e5acf650774413ff91c067260e9c95fe24a12838241b132a0d86c4fcfc3bc1a4379e6fd752220699d4b134eb904bac8ddf01ff82388d0f7f8ec230a580891e4b4ee0ef232a4ea028ede4fd0075cef5b61aa71bd700254706688699fc74d6854b029bfbc1da2629fe6e8dfdf1f28882904d57eb42050dc623f57d45", 0xb7, 0x1f}, {&(0x7f0000000380)="d87bca2731ba8fe447f5565819052317f4ec9a91a5672ee49f9c12abd85b1e3b8ade071a1b4b3d84d16ffd0de497a02a86b4d10d44e20b5a3b577edc164586e25afce6c1965d376bb4375a4754dd869d401aec8ec1229f8442a1491b0f146f44dc7179719fe682fc27ed77cf51769f822c873b342b6b472b8d81ae96efff50e25807de5a6cab9e3855c75919c200001d58966e4b79ac66edac0c", 0x9a}, {&(0x7f0000000440)="56bee382aff24a22b774d937c4cda86b60ad4fb06f8af87cd270336981a4a0b160f7ed7a955276f299b9e546341a71e772104f010f2d8ceadfaccc3115efe252c516458bf4bb6b7193fb175c", 0x4c, 0xfffffffffffffffb}, {&(0x7f00000004c0)="c595200d6300c5b9563cb00fe49c056399d8918970dc0d6305d88b41fdfd4bf1e5cba78c4cdff2ec69a519ed88ae6fa989e72da5527391cc02e4cd677c67725303dab1a49281f0d54ab46646cf845c785aa5f934ae14abb9b83a132901709a4fd3eec8ad0579867ce91b40655fe3fb234430bd917c6585e95c069973a79633fbf5d932fe2d37a6404943d35c2c09d47c3fea59487e09e9d6641d9e114443ad0e121681a141892963c3", 0xa9, 0x3}, {&(0x7f0000000580)="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", 0x1000, 0x7}, {&(0x7f0000001580)="1c6af895fcd0c993315c28b689cff3f11f00043d5fe690178f66e630fd953054d3b07a5af513bd2b17b35db87154833cc846df0ff8cc43f8a907600c3ae9f03f3107bf12487528c0a257639e23eb4ac1950487e07b088000e7efc0b97b106a42dbdec79c6fe0f0b994ecde8494bb5cdfe40f883cf4acf295385856bf2cdd76b621ba98", 0x83, 0x9}], 0x100020, &(0x7f00000017c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}], [{@euid_gt={'euid>', r0}}, {@subj_user={'subj_user'}}, {@permit_directio='permit_directio'}]}) [ 1358.756799] bond0 (unregistering): Released all slaves 07:40:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_is"ze'}}]}) [ 1358.904220] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:40:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'ucer_id'}, 0x2c, {'group_id'}}) [ 1359.101291] EXT4-fs: 22 callbacks suppressed [ 1359.101311] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is"ze=0x0000000000000000" or missing value [ 1359.149422] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1359.193469] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1359.220012] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is"ze=0x0000000000000000" or missing value [ 1359.433574] EXT4-fs (sda1): Unrecognized mount option "journal_" or missing value [ 1359.961901] bridge0: port 1(bridge_slave_0) entered blocking state [ 1359.968726] bridge0: port 1(bridge_slave_0) entered disabled state [ 1359.978016] device bridge_slave_0 entered promiscuous mode [ 1360.020848] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.027731] bridge0: port 2(bridge_slave_1) entered disabled state [ 1360.035028] device bridge_slave_1 entered promiscuous mode [ 1360.078750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1360.120459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1360.245161] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1360.289860] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1360.449392] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1360.456562] team0: Port device team_slave_0 added [ 1360.496256] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1360.503719] team0: Port device team_slave_1 added [ 1360.545667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1360.576055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1360.617142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1360.624316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1360.640014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1360.672641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1360.924408] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.930794] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1360.937501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.943866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1360.951467] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1361.867111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1361.917416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1361.964589] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1362.053596] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1362.059884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1362.066830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1362.156439] 8021q: adding VLAN 0 to HW filter on device team0 07:41:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'uper_id'}, 0x2c, {'group_id'}}) 07:41:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_is,ze'}}]}) 07:41:03 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000001c0)=0x8d) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000180)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB='journal_pzth}./file0,\x00']) [ 1362.681202] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1362.693007] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1362.765078] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is" or missing value [ 1362.775878] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1362.804053] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u*er_id'}, 0x2c, {'group_id'}}) 07:41:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1362.862236] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1362.897695] EXT4-fs (sda1): Unrecognized mount option "journal_pzth}./file0" or missing value [ 1362.949512] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is" or missing value 07:41:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/145, 0x91) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:41:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isi\ne'}}]}) 07:41:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1363.039627] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1363.060549] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1363.071943] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1363.081563] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'u.er_id'}, 0x2c, {'group_id'}}) [ 1363.176813] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1363.248727] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1363.303283] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 1363.303283] e=0x0000000000000000" or missing value 07:41:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000007fffffe00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@mangle={'mangle\x00', 0x1f, 0x6, 0x800, 0x2b8, 0x5f8, 0x1a0, 0x1a0, 0x5f8, 0x730, 0x730, 0x730, 0x730, 0x730, 0x6, &(0x7f0000000180), {[{{@uncond, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x6e, 0x3b978, 0x1, 0xad89, 0x0, @loopback, @mcast1, @empty, [0xffffff00, 0xff, 0xff000000, 0xff000000], [0x0, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x80, 0x100}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@local, @ipv6=@remote, 0x34, 0x29, 0x99a2}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x19}, @remote, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0xff000000, 0xff], 'gre0\x00', 'veth1_to_team\x00', {}, {0xff}, 0x7e, 0x8, 0x2, 0x4}, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x19a5781b}}}, {{@ipv6={@remote, @remote, [0xff000000, 0xffffffff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff000000, 0xffffffff], 'bcsh0\x00', 'bond0\x00', {0xff}, {}, 0x3b, 0x1000, 0x1, 0xb}, 0x0, 0x200, 0x228, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x400, 0x1ff, 0x5, 0x5, 0x2, 0x2, [@mcast2, @mcast2, @dev={0xfe, 0x80, [], 0x21}, @local, @local, @local, @remote, @dev={0xfe, 0x80, [], 0x1d}, @ipv4={[], [], @multicast1}, @loopback, @mcast2, @empty, @remote, @mcast1, @mcast2, @loopback], 0x10}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x56c}}}, {{@ipv6={@remote, @loopback, [0xff000000, 0x0, 0xff0000ff, 0xff], [0x0, 0xffffffff, 0xffffffff, 0xffffffff], 'team0\x00', 'vlan0\x00', {0xff}, {0xff}, 0xff, 0x4390f534, 0x3, 0x40}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x10, 0x6, 0x9000000000}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x12}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv6=@mcast1, 0xb, 0x3e, 0x100000001}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x860) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) getrandom(&(0x7f0000000280)=""/211, 0xd3, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x10001f, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1363.401706] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1363.434526] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:03 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000000000000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'uder_id'}, 0x2c, {'group_id'}}) [ 1363.495784] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1363.505629] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1363.543867] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 1363.543867] e=0x0000000000000000" or missing value 07:41:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x1, 0x20000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000180)) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1363.668257] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1363.703789] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isi"e'}}]}) [ 1363.713974] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1363.727809] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'us,r_id'}, 0x2c, {'group_id'}}) [ 1363.975335] EXT4-fs (sda1): Cannot specify journal on remount [ 1363.987146] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1364.063163] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1364.078022] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi"e=0x0000000000000000" or missing value [ 1364.088024] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'us"r_id'}, 0x2c, {'group_id'}}) 07:41:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1364.157736] EXT4-fs (sda1): Cannot specify journal on remount [ 1364.181683] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1364.190218] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:04 executing program 5: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[], [{@fowner_gt={'fowner>', r0}}, {@dont_appraise='dont_appraise'}]}) [ 1364.260327] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi"e=0x0000000000000000" or missing value 07:41:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isi,e'}}]}) [ 1364.314476] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1364.366611] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1364.384029] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1364.434943] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'use,_id'}, 0x2c, {'group_id'}}) 07:41:04 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1364.574113] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value 07:41:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'use\n_id'}, 0x2c, {'group_id'}}) 07:41:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1364.659661] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1364.663441] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1364.675805] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi" or missing value [ 1364.679127] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1364.782929] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1364.792320] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 1364.799213] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000000000000100", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:05 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000740)='/dev/full\x00', 0x400401, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000780)=0x6, 0x4) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x8000) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x13eeab978cabcbbb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f00000003c0)='./file1\x00', 0x100000000000000, 0x3, &(0x7f0000000680)=[{&(0x7f0000000400)="ba0505c1b7d18574e6d581284a9899223b8114ee5971c2372a1c50b00845eaeb2b7e77f0452e494d3ef697ca49d5149a69bf8e8aebb586b3b3fe1d65fdbdd3de53c9", 0x42, 0x200}, {&(0x7f0000000480)="8ecdecb4313da2e4863f271baa6150dc407841912f783163f4cdbc447d3ee655b2ad51e194edc744cef22f6b6fa897f19a53ca068ff72aa023005b1a76e5087225059154ba62569007dd1bc2af036552761bb1ec0235dcadca80ebcf700ed394c79088f73bedd54aae1bbaf76a22a9de67ea03631f0f6b05d452f4ade9b5b5358eefe5d403f7e80cd793f7130ee465b242fc453c4b2924a00d080be00fe8342806655d7bacd5928b85f4d332fd92bd4cee4180a8c74d052a659484322d07ccfbe769a73a08c338f64e654a4a8fc6a1c200dbbc5a38c0f5dce2d609a73997bdb98849598b637a6acd5a9269", 0xeb, 0x3f}, {&(0x7f0000000580)="0518e8a132025986df1764884f886f16be7095d02d936f35f094d382aefaae24f016ccf4d96539e6adb2cd47db60fab011737eef0e6c165df3cdb490e6569eae29e69c2d336b066fdef24faf9a05eaf50d0e865aa162038de906d845b08dcd0e04fa964cd335a6c2cb9ad55ed330fe55bc4cde5778b9aae3956a5c6c9e6aee1b17084dac4eb2b38f6e429f44af92203534bceadf35e509b217dd9f5b06e9af7eed1e2e7553a54b02cb4ba4371866d80832f4421c7c7e68d9aba683589976538c52273fe5e41b65ae09c377c526c87f870207790724a8e7a055919ef28aff4c3063a1d81b199ccf13bce6d009ef8f15", 0xef, 0x4}], 0x200c0, &(0x7f0000000700)=ANY=[@ANYBLOB="6c617a7974696d652c6673757569643d007f77356200382d003575002d633f39732d7d0076632d36633036346432652c0000"]) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000000280)=@sg0='/dev/sg0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='proc\x00', 0x1a0008, &(0x7f0000000340)='/dev/bus/usb/00#/00#\x00') syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 1364.889425] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1364.897678] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'use"_id'}, 0x2c, {'group_id'}}) [ 1364.954759] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi" or missing value [ 1364.960759] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isizl'}}]}) 07:41:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1365.005159] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1365.132953] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1365.167972] EXT4-fs (sda1): Cannot specify journal on remount [ 1365.221434] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1365.250482] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'use%_id'}, 0x2c, {'group_id'}}) [ 1365.299067] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1365.328220] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizl=0x0000000000000000" or missing value 07:41:05 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x20000000000) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0xe000, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e2f66696c65302d00966d0c4d591856d0560bc72de170d450284badafae10afddf72199130534cc61c644f433c9865dc9b0fd53d5d77a69033233ee1a8389fcb04e85a686d1277e7515ff8795a29128f40ceab98b9eaa654e750ab9c4bcd14aa7a9bd8715d789a1cb91544e0e9256f26209cd838bc7a9acaf60465d45029de1277f00a8b08aa0ab7051008aa829716ed1d18765603e1b6f9638dfa7dc419866ba6ec0b6a060c1c03315199ab782c6e1ff02f1635276d1c4d3a14bddbe3f3b91f2f6d50ca665b89d7569a50c8088a5"]) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) [ 1365.484833] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizl=0x0000000000000000" or missing value [ 1365.498209] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:05 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user"id'}, 0x2c, {'group_id'}}) 07:41:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz\n'}}]}) [ 1365.528207] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1365.553312] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="6a4f4d413362ca6eaff567cd179175726ec96600706174683d2e2fd5696c65302c000d7b299c096f3355ec4c2b07bc2a7218d235e8380674c54acc4e51ae817d8e06ab3e89327e85abdc448bebdac8ef4d25d3618ce5068e7ac677a5ed25c11fb715c98b4b1ebb8cd83fa1791e064c11f5d5130fb559a88017904f863968a6cd820e979df0778c9075b4688a83cd415aae362edb597c828084bc82e8f49220a541d4"]) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40040, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000280)={@dev, 0x0}, &(0x7f00000002c0)=0x14) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000480)={0x200, 0x4, 0x2, "e987f797d74c31973e867b7e97ae83972448a27b97f52bccd31a36395dc7420b", 0x34324948}) poll(&(0x7f0000000340)=[{r0, 0x8000}, {r0, 0x800c}], 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x4e21}}, 0x77, 0x80000001, 0xf42, "d3e4116adc27278dcbab714eec0613eadf50e915ceb8dfad161be3213880ff10589d0b66a72d269e617704ae7da55418b129c6e484774a005a13efd1424b1473f2002501253f0899940b89bf2474f350"}, 0xd8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', r1}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000080)={0x6, 0x2, 0x1, {0x80000001, 0x8, 0x7, 0x3cf}}) [ 1365.728059] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1365.745852] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user,id'}, 0x2c, {'group_id'}}) [ 1365.785448] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1365.799157] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1365.811298] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 1365.811298] =0x0000000000000000" or missing value 07:41:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000000000000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000180)=ANY=[@ANYPTR, @ANYRESDEC]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) uselib(&(0x7f0000000000)='./file0\x00') 07:41:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1365.978573] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz"'}}]}) 07:41:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000007fffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1366.024213] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1366.055239] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_\nd'}, 0x2c, {'group_id'}}) [ 1366.260372] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000080)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9, 0x600041) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000180)={0x1, 0x58, [{0x7, 0x0, 0x5}]}) [ 1366.356182] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1366.392125] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1366.406596] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}]}) 07:41:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_"d'}, 0x2c, {'group_id'}}) 07:41:06 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1366.624360] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1366.662252] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1366.674556] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1366.692602] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:07 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000007fffffe00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_%d'}, 0x2c, {'group_id'}}) 07:41:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz,'}}]}) 07:41:07 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f00000001c0)={'u:r:untrusted_app:s0:c512,c768', 0x20, '/usr/lib/telepathy/mission-control-5'}, 0x59) [ 1366.878399] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1366.923768] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:07 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1367.016548] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:07 executing program 5: [ 1367.068738] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1367.135869] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_,d'}, 0x2c, {'group_id'}}) 07:41:07 executing program 5: 07:41:07 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1367.197893] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x7}}]}) 07:41:07 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) [ 1367.369630] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1367.379676] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1367.434411] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1367.451062] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_i\n'}, 0x2c, {'group_id'}}) 07:41:07 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:07 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f0000000280)=@ethtool_wolinfo={0x0, 0x0, 0x0, "1da8cf216414"}}) [ 1367.640121] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1367.679131] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_i"'}, 0x2c, {'group_id'}}) 07:41:08 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000000000000600", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) fsetxattr$security_smack_entry(r0, &(0x7f0000000480)='security.SMACK64EXEC\x00', &(0x7f00000004c0)='bdevkeyring+/em0,-cpuset\x00', 0x19, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) clock_gettime(0x0, &(0x7f0000000140)) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f00000001c0)=0x2) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000340)="93d79f948d474363797d6be797a9ec2402a0e00c4ca1dbb2e9ef585a4e1c3c99d1778d9c523968ccc8e7", 0x2a, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x80000001, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, 0x8, 0xff, 0x8000, 0x1, 0x5, 0x6, 0xfff, 0x4, 0x2, 0xc5, 0x4, 0x5, 0xffffffffffffffff, 0x3f, 0x1, 0x7fff, 0x3, 0x3, 0x1, 0x7, 0x1000, 0x6d5, 0x7, 0x6a000000, 0x0, 0x2, 0xc94b, 0x1000, 0x3ff, 0x0, 0x7457f618, 0x5, @perf_bp={&(0x7f0000000500), 0x2}, 0x4420, 0xcd17, 0x9, 0x3, 0x5, 0x4, 0x9b0}, 0x0, 0x7, r3, 0xb) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000440)={'veth1\x00', {0x2, 0x0, @broadcast}}) [ 1367.688606] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1367.699359] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0xa}}]}) 07:41:08 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000000000000400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1367.858471] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1367.934883] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1367.988385] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1367.990717] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_i,'}, 0x2c, {'group_id'}}) 07:41:08 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25}}]}) [ 1368.211113] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1368.269072] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x22}, 0x2c, {'group_id'}}) 07:41:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1368.707555] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1368.754630] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x2c}, 0x2c, {'group_id'}}) 07:41:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}]}) [ 1369.006023] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1369.067152] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:09 executing program 5: r0 = socket(0x10, 0x802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000000)="240000001a0025e0046bbc04fef7001c020b49ff00000000801008000800030001000000", 0x24) 07:41:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x47}, 0x2c, {'group_id'}}) [ 1369.239346] EXT4-fs: 17 callbacks suppressed [ 1369.239358] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value 07:41:09 executing program 5: 07:41:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1369.320888] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1369.368630] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:09 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000000000000009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:09 executing program 5: 07:41:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}]}) 07:41:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0xa}, 0x2c, {'group_id'}}) 07:41:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1369.551921] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value 07:41:09 executing program 5: [ 1369.612119] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x22, {'group_id'}}) [ 1369.659131] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1369.674426] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value 07:41:10 executing program 5: [ 1369.786629] IPVS: ftp: loaded support on port[0] = 21 07:41:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x6c}}]}) 07:41:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1369.873134] device bridge_slave_1 left promiscuous mode [ 1369.879374] bridge0: port 2(bridge_slave_1) entered disabled state 07:41:10 executing program 5: 07:41:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1369.937957] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1369.944906] device bridge_slave_0 left promiscuous mode [ 1369.950530] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.973196] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizel0x0000000000000000" or missing value [ 1370.069330] team0 (unregistering): Port device team_slave_1 removed [ 1370.083978] team0 (unregistering): Port device team_slave_0 removed [ 1370.103178] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizel0x0000000000000000" or missing value [ 1370.121763] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1370.188954] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1370.268398] bond0 (unregistering): Released all slaves [ 1370.344299] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1371.061208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1371.067761] bridge0: port 1(bridge_slave_0) entered disabled state [ 1371.075084] device bridge_slave_0 entered promiscuous mode [ 1371.120201] bridge0: port 2(bridge_slave_1) entered blocking state [ 1371.126659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1371.134464] device bridge_slave_1 entered promiscuous mode [ 1371.178533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1371.221871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1371.354254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1371.401480] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1371.447226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1371.454831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1371.487949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1371.494881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1371.602132] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1371.609714] team0: Port device team_slave_0 added [ 1371.648098] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1371.655227] team0: Port device team_slave_1 added [ 1371.683060] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1371.713723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1371.743390] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1371.751125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1371.759502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1371.830959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1371.838441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1371.849509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1372.104777] bridge0: port 2(bridge_slave_1) entered blocking state [ 1372.111163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1372.117822] bridge0: port 1(bridge_slave_0) entered blocking state [ 1372.124159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1372.131580] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1372.357612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1373.074393] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1373.166046] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1373.258739] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1373.264969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1373.272236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1373.364480] 8021q: adding VLAN 0 to HW filter on device team0 07:41:14 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:14 executing program 5: 07:41:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x22}}]}) 07:41:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x47, {'group_id'}}) 07:41:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1373.906031] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1373.918897] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:14 executing program 5: 07:41:14 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x58, {'group_id'}}) [ 1374.018839] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1374.020128] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize"0x0000000000000000" or missing value [ 1374.044021] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1374.044688] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:14 executing program 5: [ 1374.148280] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize"0x0000000000000000" or missing value [ 1374.209611] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1374.214837] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1374.248838] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2c}}]}) 07:41:14 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000feffff0700", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1374.258592] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'%roup_id'}}) 07:41:14 executing program 5: [ 1374.386102] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1374.409386] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1374.423772] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:14 executing program 5: 07:41:14 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1374.453883] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize" or missing value [ 1374.463794] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:14 executing program 5: 07:41:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {',roup_id'}}) 07:41:14 executing program 5: [ 1374.576617] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize" or missing value [ 1374.585961] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d00000000000000}}]}) 07:41:15 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1374.634912] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1374.642284] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1374.655720] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'\nroup_id'}}) 07:41:15 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000009000", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:15 executing program 5: [ 1374.757962] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1374.779072] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1374.942284] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:15 executing program 5: [ 1375.001491] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe0ffffffffffffff}}]}) [ 1375.048152] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1375.097782] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'"roup_id'}}) 07:41:15 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "0000000300", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:15 executing program 5: 07:41:15 executing program 5: [ 1375.334306] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1375.351174] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1375.372051] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c}}]}) 07:41:15 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000ffffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1375.389756] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'g\noup_id'}}) 07:41:15 executing program 5: [ 1375.526387] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1375.578202] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1375.617765] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000006c,,errors=continue 07:41:15 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) [ 1375.633493] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:16 executing program 5: [ 1375.748304] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000006c,,errors=continue [ 1375.766172] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1375.813443] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) 07:41:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'g"oup_id'}}) 07:41:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xffffff7f}}]}) 07:41:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:16 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000500", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1375.949508] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1375.969746] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1375.990713] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:16 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'g%oup_id'}}) [ 1376.004406] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu\x00', 0x200002, 0x0) signalfd(r0, &(0x7f0000000340)={0xffffffff00000000}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fchdir(r2) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) 07:41:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffd}}]}) 07:41:16 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000400", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1376.121094] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1376.148376] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1376.192954] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1376.217759] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1376.230267] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'g,oup_id'}}) 07:41:16 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "000000000000000000ff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1376.265552] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfdffffff00000000}}]}) [ 1376.403552] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1376.417991] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1376.440192] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:16 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1376.456289] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1376.604862] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1376.627111] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gr"up_id'}}) 07:41:17 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace(0x18, r0) writev(r1, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) linkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 07:41:17 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00007fffffff00", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 07:41:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) 07:41:17 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, "00000000000100", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1376.780245] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1376.814844] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5000000}}]}) [ 1376.826817] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" 07:41:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pkey_mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) eventfd2(0x0, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000177, 0x0) 07:41:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gr%up_id'}}) [ 1376.944218] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 1376.989503] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:41:17 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) [ 1377.049388] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1377.076604] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000005000000,,errors=continue [ 1377.087102] ================================================================== [ 1377.087231] cgroup: cgroup2: unknown option "fd=0xffffffffffffffff" [ 1377.095437] BUG: KASAN: slab-out-of-bounds in __ext4_expand_extra_isize+0x16f/0x240 [ 1377.109157] Write of size 83885972 at addr ffff8801c84ac2ec by task rs:main Q:Reg/5631 [ 1377.117206] [ 1377.118854] CPU: 1 PID: 5631 Comm: rs:main Q:Reg Not tainted 4.19.0+ #99 [ 1377.125701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1377.135055] Call Trace: [ 1377.137656] dump_stack+0x244/0x39d [ 1377.141300] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1377.146496] ? printk+0xa7/0xcf 07:41:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gr,up_id'}}) [ 1377.149799] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1377.154575] print_address_description.cold.7+0x9/0x1ff [ 1377.159966] kasan_report.cold.8+0x242/0x309 [ 1377.164387] ? __ext4_expand_extra_isize+0x16f/0x240 [ 1377.169514] check_memory_region+0x13e/0x1b0 [ 1377.173938] memset+0x23/0x40 [ 1377.177086] __ext4_expand_extra_isize+0x16f/0x240 [ 1377.180112] kasan: CONFIG_KASAN_INLINE enabled [ 1377.182026] ext4_mark_inode_dirty+0x8f9/0xb20 [ 1377.182047] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 1377.182061] ? __might_sleep+0x95/0x190 [ 1377.182082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1377.205626] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 1377.211368] ? __lock_is_held+0xb5/0x140 [ 1377.214089] BUG: unable to handle kernel paging request at ffff8801cd136198 [ 1377.215460] ? ext4_setattr+0x28f0/0x28f0 [ 1377.222540] PGD be01067 P4D be01067 PUD 1d942a063 PMD 1b32ad063 PTE 0 [ 1377.226672] ext4_dirty_inode+0x97/0xc0 [ 1377.233227] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1377.237194] __mark_inode_dirty+0x7c3/0x1510 [ 1377.241652] CPU: 0 PID: 8198 Comm: syz-executor2 Not tainted 4.19.0+ #99 [ 1377.246047] ? __inode_attach_wb+0x13f0/0x13f0 [ 1377.252860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1377.257443] ? mark_buffer_dirty+0x1c6/0x8d0 [ 1377.266773] RIP: 0010:spurious_kernel_fault+0x424/0x570 [ 1377.271158] ? __lock_is_held+0xb5/0x140 [ 1377.276494] Code: 21 fe 48 b8 00 00 00 00 00 fc ff df 4d 01 f4 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 31 01 00 00 49 be ff 0f 00 00 00 00 f0 ff <4d> 23 34 24 31 ff 41 81 e6 01 01 00 00 44 89 f6 e8 b7 4b 47 00 45 [ 1377.280534] ? buffer_io_error+0xa0/0xa0 [ 1377.299417] RSP: 0018:ffff8801d1d97510 EFLAGS: 00010046 [ 1377.303551] ? wait_for_stable_page+0x1a5/0x570 [ 1377.308891] RAX: dffffc0000000000 RBX: 0000000000000003 RCX: ffffffff81383fac [ 1377.313543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1377.320788] RDX: 1ffff10039a26c33 RSI: ffffffff81383fcc RDI: 0000000000000007 [ 1377.326305] ? unlock_page+0x2c2/0x4c0 [ 1377.333548] RBP: ffff8801d1d97548 R08: ffff8801d23fe140 R09: 0000000000000000 [ 1377.337419] ? wake_up_page_bit+0x6f0/0x6f0 [ 1377.344663] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801cd136198 [ 1377.348966] ? __might_sleep+0x95/0x190 [ 1377.356215] R13: ffff8801ce36cd00 R14: fff0000000000fff R15: 000ffffffffff000 [ 1377.360170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.367415] FS: 0000000001149940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 1377.367426] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1377.372947] ? __block_commit_write.isra.37+0x301/0x3f0 [ 1377.381146] CR2: ffff8801cd136198 CR3: 00000001b4b4f000 CR4: 00000000001406f0 [ 1377.387014] __generic_write_end+0x320/0x400 [ 1377.392348] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1377.399605] ? remove_inode_buffers+0x3f0/0x3f0 [ 1377.403987] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1377.411242] ? block_write_end+0xab/0x230 [ 1377.415891] Call Trace: [ 1377.423238] ? page_zero_new_buffers+0x8f0/0x8f0 [ 1377.427368] __do_page_fault+0x885/0xe60 [ 1377.429931] ? __lock_is_held+0xb5/0x140 [ 1377.434662] ? __sched_text_start+0x8/0x8 [ 1377.438700] generic_write_end+0x6c/0x90 [ 1377.442736] do_page_fault+0xf2/0x7e0 [ 1377.446895] ext4_da_write_end+0x2e0/0xcd0 [ 1377.450929] ? vmalloc_sync_all+0x30/0x30 [ 1377.454709] ? kasan_check_write+0x14/0x20 [ 1377.458931] ? error_entry+0x76/0xd0 [ 1377.463058] ? ext4_write_end+0x10c0/0x10c0 [ 1377.467271] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1377.470964] ? iov_iter_zero+0x1360/0x1360 [ 1377.475266] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1377.480284] ? __sanitizer_cov_trace_cmp2+0x1e/0x20 [ 1377.484500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.489412] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 1377.494400] ? trace_hardirqs_on_caller+0x310/0x310 [ 1377.499223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.504394] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1377.509393] ? timespec64_trunc+0xea/0x180 [ 1377.514911] ? retint_kernel+0x1b/0x2d [ 1377.520336] ? inode_init_owner+0x340/0x340 [ 1377.524545] ? trace_hardirqs_on+0x310/0x310 [ 1377.528413] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 1377.532709] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.537091] ? ext4_write_end+0x10c0/0x10c0 [ 1377.542169] page_fault+0x1e/0x30 [ 1377.546991] generic_perform_write+0x4ca/0x6a0 [ 1377.551291] RIP: 0010:memset_erms+0x9/0x10 [ 1377.554726] ? add_page_wait_queue+0x400/0x400 [ 1377.559280] Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 [ 1377.563495] ? current_time+0x1b0/0x1b0 [ 1377.568048] RSP: 0018:ffff8801d1d977e8 EFLAGS: 00010282 [ 1377.586936] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1377.590891] RAX: 0000000000000000 RBX: ffff8801b0afb8ec RCX: 0000000001ac8880 [ 1377.596236] ? generic_write_checks+0x266/0x3d0 [ 1377.601224] RDX: 0000000004ffff94 RSI: 0000000000000000 RDI: ffff8801b4033000 [ 1377.608480] ? generic_write_check_limits+0x370/0x370 [ 1377.613124] RBP: ffff8801d1d97808 R08: ffffed0036162008 R09: ffff8801b0afb8ec [ 1377.620391] ? ext4_file_write_iter+0x2a1/0x1420 [ 1377.625551] R10: ffffed0036b5f70f R11: ffff8801b5afb87f R12: 0000000004ffff94 [ 1377.632807] __generic_file_write_iter+0x26e/0x630 [ 1377.637537] R13: 0000000000000000 R14: ffff8801b0afb8ec R15: 0000000005000000 [ 1377.644790] ext4_file_write_iter+0x390/0x1420 [ 1377.649705] ? memset+0x31/0x40 [ 1377.656957] ? ext4_file_mmap+0x410/0x410 [ 1377.661518] __ext4_expand_extra_isize+0x16f/0x240 [ 1377.664774] ? ksys_dup3+0x680/0x680 [ 1377.668910] ext4_mark_inode_dirty+0x8f9/0xb20 [ 1377.673813] ? zap_class+0x640/0x640 [ 1377.677507] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 1377.682065] ? __lock_is_held+0xb5/0x140 [ 1377.685760] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1377.690664] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1377.694702] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 1377.699700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.704609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.709780] ? inode_has_perm.isra.59+0x17a/0x210 [ 1377.715291] ? inode_init_owner+0x340/0x340 [ 1377.720801] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1377.725626] ? current_time+0x131/0x1b0 [ 1377.729921] ? iov_iter_init+0xe5/0x210 [ 1377.735435] ? timespec64_trunc+0x180/0x180 [ 1377.739473] __vfs_write+0x6b8/0x9f0 [ 1377.743430] ext4_unlink+0x788/0x1220 [ 1377.747729] ? kernel_read+0x120/0x120 [ 1377.751435] ? ext4_rmdir+0xd70/0xd70 [ 1377.755227] ? __lock_is_held+0xb5/0x140 [ 1377.759093] ? may_link+0x330/0x420 [ 1377.762886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.766940] ? selinux_inode_rename+0x880/0x880 [ 1377.770545] ? __sb_start_write+0x1b2/0x370 [ 1377.776064] ? down_write+0x8a/0x130 [ 1377.780707] vfs_write+0x1fc/0x560 [ 1377.785004] ? selinux_inode_unlink+0x22/0x30 [ 1377.788702] ksys_write+0x101/0x260 [ 1377.792226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.796698] ? __ia32_sys_read+0xb0/0xb0 [ 1377.800302] vfs_unlink+0x2db/0x510 [ 1377.805827] ? trace_hardirqs_off_caller+0x310/0x310 [ 1377.809863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.813471] __x64_sys_write+0x73/0xb0 [ 1377.818549] do_unlinkat+0x6cc/0xa30 [ 1377.824068] do_syscall_64+0x1b9/0x820 [ 1377.827933] ? __ia32_sys_rmdir+0x40/0x40 [ 1377.831624] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1377.835487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1377.839615] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1377.844957] ? strncpy_from_user+0x411/0x5a0 [ 1377.850581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.855487] ? digsig_verify+0x1530/0x1530 [ 1377.859882] ? trace_hardirqs_on_caller+0x310/0x310 [ 1377.864705] ? kmem_cache_alloc+0x33a/0x730 [ 1377.868915] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1377.873915] ? trace_hardirqs_on+0xbd/0x310 [ 1377.878209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.883202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.887500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1377.892403] ? getname_flags+0x26e/0x590 [ 1377.892417] __x64_sys_unlink+0x42/0x50 [ 1377.897932] RIP: 0033:0x7f9f425ca19d [ 1377.903103] do_syscall_64+0x1b9/0x820 [ 1377.907140] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1377.911092] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1377.914776] RSP: 002b:00007f9f40b6b000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1377.918648] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1377.937639] RAX: ffffffffffffffda RBX: 0000000000000183 RCX: 00007f9f425ca19d [ 1377.942985] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.950662] RDX: 0000000000000183 RSI: 0000000002414a90 RDI: 0000000000000005 [ 1377.955574] ? trace_hardirqs_on_caller+0x310/0x310 [ 1377.962821] RBP: 0000000002414a90 R08: 0000000002414b85 R09: 00007f9f41f47887 [ 1377.967644] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1377.967654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.967678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1377.967685] RIP: 0033:0x4572b7 [ 1377.967694] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1377.967698] RSP: 002b:00007ffea329b668 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 1377.967706] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004572b7 [ 1377.967710] RDX: 00007ffea329b680 RSI: 00007ffea329b680 RDI: 00007ffea329b710 [ 1377.967715] RBP: 0000000000000d12 R08: 0000000000000000 R09: 0000000000000011 [ 1377.967720] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffea329c7a0 [ 1377.967724] R13: 000000000114a940 R14: 0000000000000000 R15: 0000000000000002 [ 1377.967732] Modules linked in: [ 1377.967739] CR2: ffff8801cd136198 [ 1377.967750] ---[ end trace 58be776f20d6fe89 ]--- [ 1377.967783] RIP: 0010:spurious_kernel_fault+0x424/0x570 [ 1377.967791] Code: 21 fe 48 b8 00 00 00 00 00 fc ff df 4d 01 f4 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 31 01 00 00 49 be ff 0f 00 00 00 00 f0 ff <4d> 23 34 24 31 ff 41 81 e6 01 01 00 00 44 89 f6 e8 b7 4b 47 00 45 [ 1377.967795] RSP: 0018:ffff8801d1d97510 EFLAGS: 00010046 [ 1377.967801] RAX: dffffc0000000000 RBX: 0000000000000003 RCX: ffffffff81383fac [ 1377.967805] RDX: 1ffff10039a26c33 RSI: ffffffff81383fcc RDI: 0000000000000007 [ 1377.967810] RBP: ffff8801d1d97548 R08: ffff8801d23fe140 R09: 0000000000000000 [ 1377.967815] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801cd136198 [ 1377.967838] R13: ffff8801ce36cd00 R14: fff0000000000fff R15: 000ffffffffff000 [ 1377.967846] FS: 0000000001149940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 1377.967851] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1377.967855] CR2: ffff8801cd136198 CR3: 00000001b4b4f000 CR4: 00000000001406f0 [ 1377.967863] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1377.967877] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1377.967886] Kernel panic - not syncing: Fatal exception [ 1377.984384] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1377.984399] R13: 00007f9f40b6b480 R14: 0000000000000003 R15: 0000000002414890 [ 1378.231018] [ 1378.232633] The buggy address belongs to the page: [ 1378.237551] page:ffffea0007212b00 count:2 mapcount:0 mapping:ffff8801cc08ec58 index:0x427 [ 1378.245863] flags: 0x2fffc000000203a(referenced|dirty|lru|active|private) [ 1378.253055] raw: 02fffc000000203a ffffea0006c3b388 ffffea0006c26108 ffff8801cc08ec58 [ 1378.260931] raw: 0000000000000427 ffff8801bdbf3dc8 00000002ffffffff ffff8801d9a4adc0 [ 1378.268796] page dumped because: kasan: bad access detected [ 1378.274488] page->mem_cgroup:ffff8801d9a4adc0 [ 1378.278968] [ 1378.280578] Memory state around the buggy address: [ 1378.285496] ffff8801c87fff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1378.292844] ffff8801c87fff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1378.300203] >ffff8801c8800000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1378.307544] ^ [ 1378.310901] ffff8801c8800080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1378.318246] ffff8801c8800100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1378.325591] ================================================================== [ 1378.334185] Kernel Offset: disabled [ 1378.337818] Rebooting in 86400 seconds..