7cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:03:41 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(0x0, &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1830.458219] loop5: detected capacity change from 0 to 16372 [ 1830.463468] loop3: detected capacity change from 0 to 16372 [ 1830.466493] ext2: Unknown parameter 'dont_measure' [ 1830.472781] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1830.473126] ext2: Unknown parameter 'dont_measure' [ 1830.481546] loop6: detected capacity change from 0 to 16372 01:03:42 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{0x0, 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1830.500999] ext2: Unknown parameter 'dont_measure' [ 1830.507784] loop7: detected capacity change from 0 to 16372 [ 1830.518015] ext2: Unknown parameter 'subj_type' 01:03:42 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:03:42 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:03:42 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:03:42 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1830.659903] loop5: detected capacity change from 0 to 16372 [ 1830.667259] ext2: Unknown parameter 'dont_measure' [ 1830.691054] loop6: detected capacity change from 0 to 16372 [ 1830.697741] ext2: Unknown parameter 'dont_measure' 01:03:53 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:03:53 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', 0x0]) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:03:53 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:03:53 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:03:53 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(0x0, &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:03:53 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{0x0, 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:03:53 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:03:53 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1841.909773] loop6: detected capacity change from 0 to 16372 [ 1841.928024] ext2: Unknown parameter 'dont_measure' [ 1841.931912] loop5: detected capacity change from 0 to 16372 01:03:53 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x0, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 1841.942356] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1841.945456] ext2: Unknown parameter 'dont_measure' [ 1841.966980] loop7: detected capacity change from 0 to 16372 [ 1841.968856] loop3: detected capacity change from 0 to 16372 [ 1841.975340] ext2: Unknown parameter 'subj_type' [ 1841.977188] ext2: Unknown parameter 'dont_measure' 01:03:53 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:03:53 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:03:53 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:03:53 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:03:53 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1842.111946] loop6: detected capacity change from 0 to 16372 01:03:53 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', 0x0]) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1842.120769] loop5: detected capacity change from 0 to 16372 [ 1842.126555] ext2: Unknown parameter 'dont_measure' [ 1842.133344] ext2: Unknown parameter 'dont_measure' 01:03:53 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:03:53 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:03:53 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1842.190761] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1842.193659] loop7: detected capacity change from 0 to 16372 [ 1842.209468] ext2: Unknown parameter 'subj_type' [ 1842.223213] loop3: detected capacity change from 0 to 16372 [ 1842.229307] ext2: Unknown parameter 'dont_measure' 01:03:53 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1842.262574] loop5: detected capacity change from 0 to 16372 [ 1842.264843] ext2: Unknown parameter 'dont_measure' 01:04:05 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', 0x0]) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:05 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x0, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:05 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef7", 0x1a, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:04:05 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:05 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:05 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') lstat(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:04:05 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:05 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1854.157244] loop7: detected capacity change from 0 to 16372 [ 1854.158673] ext2: Unknown parameter 'subj_type' [ 1854.159522] loop3: detected capacity change from 0 to 16372 [ 1854.166364] ext2: Unknown parameter 'dont_measure' 01:04:05 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1854.221189] loop5: detected capacity change from 0 to 16372 [ 1854.222257] ext2: Unknown parameter 'dont_measure' [ 1854.225818] loop6: detected capacity change from 0 to 16372 01:04:05 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1854.236734] ext2: Unknown parameter 'dont_measure' 01:04:05 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1854.291581] loop3: detected capacity change from 0 to 16372 [ 1854.292347] loop7: detected capacity change from 0 to 16372 [ 1854.302821] ext2: Unknown parameter 'dont_measure' [ 1854.305964] ext2: Unknown parameter 'subj_type' 01:04:17 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:17 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') lstat(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:04:17 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x0, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:17 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:04:17 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:17 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:04:17 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:17 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1865.984426] loop5: detected capacity change from 0 to 16372 [ 1865.990327] loop7: detected capacity change from 0 to 16372 [ 1865.992024] loop3: detected capacity change from 0 to 16372 [ 1865.996001] ext2: Unknown parameter 'dont_measure' [ 1865.997069] ext2: Unknown parameter 'dont_measure' [ 1865.998284] ext2: Unknown parameter 'subj_type' [ 1866.017482] loop6: detected capacity change from 0 to 16372 [ 1866.027347] ext2: Unknown parameter 'dont_measure' 01:04:17 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') lstat(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:04:17 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:04:17 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:17 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:17 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1866.098111] loop5: detected capacity change from 0 to 16372 [ 1866.105486] ext2: Unknown parameter 'dont_measure' [ 1866.111265] loop3: detected capacity change from 0 to 16372 [ 1866.121056] ext2: Unknown parameter 'dont_measure' 01:04:17 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:04:17 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:04:17 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1866.183442] loop7: detected capacity change from 0 to 16372 [ 1866.190287] ext2: Unknown parameter 'subj_type' [ 1866.215249] loop5: detected capacity change from 0 to 16372 [ 1866.216022] loop6: detected capacity change from 0 to 16372 [ 1866.218293] ext2: Unknown parameter 'dont_measure' [ 1866.256210] ext2: Unknown parameter 'dont_measure' 01:04:31 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:04:31 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', 0x0, &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:31 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, 0x0, 0x0) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:31 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:31 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:31 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:04:31 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b", 0xd, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:04:31 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 1880.044891] loop6: detected capacity change from 0 to 16372 [ 1880.050970] ext2: Unknown parameter 'dont_measure' [ 1880.054710] loop7: detected capacity change from 0 to 16372 [ 1880.056929] ext2: Unknown parameter 'subj_type' [ 1880.069926] loop3: detected capacity change from 0 to 16372 [ 1880.071919] ext2: Unknown parameter 'dont_measure' [ 1880.074551] loop5: detected capacity change from 0 to 16372 [ 1880.082576] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1880.084888] ext2: Unknown parameter 'dont_measure' 01:04:31 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:04:31 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cff", 0x6c, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:04:31 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:31 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', 0x0, &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:31 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:31 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 1880.284632] loop5: detected capacity change from 0 to 16372 [ 1880.293156] ext2: Unknown parameter 'dont_measure' [ 1880.328791] loop3: detected capacity change from 0 to 16372 [ 1880.329497] loop7: detected capacity change from 0 to 16372 [ 1880.336100] ext2: Unknown parameter 'dont_measure' [ 1880.339441] ext2: Unknown parameter 'subj_type' 01:04:31 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, 0x0, 0x0) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:31 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1880.354917] loop6: detected capacity change from 0 to 16372 [ 1880.356906] ext2: Unknown parameter 'dont_measure' [ 1880.361405] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 01:04:31 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x74, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:31 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1880.485543] loop5: detected capacity change from 0 to 16372 [ 1880.487415] ext2: Unknown parameter 'dont_measure' 01:04:46 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:46 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x74, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:46 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, 0x0, 0x0) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:46 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', 0x0, &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:46 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:46 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:04:46 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:04:46 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1895.135551] loop7: detected capacity change from 0 to 16372 [ 1895.141542] ext2: Unknown parameter 'subj_type' [ 1895.172158] loop3: detected capacity change from 0 to 16372 [ 1895.179043] loop6: detected capacity change from 0 to 16372 [ 1895.182339] loop5: detected capacity change from 0 to 16372 [ 1895.188273] ext2: Unknown parameter 'dont_measure' [ 1895.193566] ext2: Unknown parameter 'dont_measure' [ 1895.197081] ext2: Unknown parameter 'dont_measure' [ 1895.204959] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 01:04:46 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897", 0x7, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:04:46 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:46 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) rmdir(&(0x7f0000000b80)='./file0\x00') lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:04:46 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:46 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:46 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1895.381320] loop7: detected capacity change from 0 to 16372 [ 1895.404082] loop6: detected capacity change from 0 to 16372 [ 1895.410391] ext2: Unknown parameter 'subj_type' [ 1895.411101] ext2: Unknown parameter 'dont_measure' [ 1895.420903] loop3: detected capacity change from 0 to 16372 [ 1895.438458] ext2: Unknown parameter 'dont_measure' [ 1895.467146] loop5: detected capacity change from 0 to 16372 [ 1895.469374] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1895.480449] ext2: Unknown parameter 'dont_measure' 01:04:59 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f", 0x36, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1908.001481] loop6: detected capacity change from 0 to 16372 [ 1908.002849] ext2: Unknown parameter 'dont_measure' 01:04:59 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:59 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:59 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x74, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:59 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0), 0x0) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:04:59 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:59 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@journal_ioprio}]}) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:04:59 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1908.006486] loop3: detected capacity change from 0 to 16372 [ 1908.011718] loop7: detected capacity change from 0 to 16372 [ 1908.021081] ext2: Unknown parameter 'dont_measure' 01:04:59 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1908.024924] ext2: Unknown parameter 'subj_type' [ 1908.028385] loop5: detected capacity change from 0 to 16372 [ 1908.031553] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1908.033034] ext2: Unknown parameter 'dont_measure' 01:04:59 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:59 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 1908.091497] loop6: detected capacity change from 0 to 16372 01:04:59 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1908.104283] ext2: Unknown parameter 'dont_measure' 01:04:59 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1908.138924] loop3: detected capacity change from 0 to 16372 [ 1908.143254] ext2: Unknown parameter 'dont_measure' [ 1908.145326] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 01:04:59 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:59 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:04:59 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:04:59 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[0x0, &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1908.233501] loop6: detected capacity change from 0 to 16372 [ 1908.235842] loop5: detected capacity change from 0 to 16372 [ 1908.237407] loop7: detected capacity change from 0 to 16372 [ 1908.244420] ext2: Unknown parameter 'subj_type' [ 1908.250476] ext2: Unknown parameter 'dont_measure' [ 1908.251974] ext2: Unknown parameter 'dont_measure' [ 1908.255825] loop3: detected capacity change from 0 to 16372 [ 1908.260425] ext2: Unknown parameter 'dont_measure' [ 1921.381775] loop7: detected capacity change from 0 to 16372 [ 1921.387227] loop3: detected capacity change from 0 to 16372 01:05:12 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:05:12 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0), 0x0) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:12 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:12 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[0x0, &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:12 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:05:12 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:12 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:05:12 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 1921.391113] ext2: Unknown parameter 'subj_type' [ 1921.393497] ext2: Unknown parameter 'dont_measure' [ 1921.397181] loop5: detected capacity change from 0 to 16372 [ 1921.408564] loop6: detected capacity change from 0 to 16372 [ 1921.411080] ext2: Unknown parameter 'dont_measure' [ 1921.415833] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 01:05:12 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1921.425333] ext2: Unknown parameter 'dont_measure' 01:05:12 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:12 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[0x0, &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:13 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1921.507738] loop7: detected capacity change from 0 to 16372 [ 1921.511120] loop3: detected capacity change from 0 to 16372 [ 1921.514290] ext2: Unknown parameter 'subj_type' [ 1921.515187] ext2: Unknown parameter 'dont_measure' [ 1921.522151] loop5: detected capacity change from 0 to 16372 01:05:13 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 1921.534983] ext2: Unknown parameter 'dont_measure' 01:05:13 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:05:13 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:13 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1921.595195] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1921.609391] loop6: detected capacity change from 0 to 16372 [ 1921.617087] ext2: Unknown parameter 'dont_measure' [ 1921.650070] loop3: detected capacity change from 0 to 16372 [ 1921.653590] ext2: Unknown parameter 'dont_measure' 01:05:26 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:05:26 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:26 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:26 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0), 0x0) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:26 executing program 2: lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:05:26 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:26 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:26 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f", 0x1b, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1934.563567] loop3: detected capacity change from 0 to 16372 [ 1934.566321] ext2: Unknown parameter 'dont_measure' [ 1934.574990] loop6: detected capacity change from 0 to 16372 [ 1934.597913] ext2: Unknown parameter 'dont_measure' 01:05:26 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1934.613448] loop5: detected capacity change from 0 to 16372 [ 1934.614573] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1934.617294] ext2: Unknown parameter 'dont_measure' [ 1934.617874] loop7: detected capacity change from 0 to 16372 [ 1934.621510] ext2: Unknown parameter 'subj_type' 01:05:26 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52", 0x28) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:26 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f", 0x1b, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:05:26 executing program 2: lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 1934.696237] loop3: detected capacity change from 0 to 16372 01:05:26 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1934.717313] ext2: Unknown parameter 'dont_measure' 01:05:26 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) 01:05:26 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1934.762937] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1934.778706] loop6: detected capacity change from 0 to 16372 [ 1934.781758] ext2: Unknown parameter 'dont_measure' [ 1934.798050] loop7: detected capacity change from 0 to 16372 [ 1934.808390] ext2: Unknown parameter 'subj_type' [ 1934.816879] loop5: detected capacity change from 0 to 16372 01:05:26 executing program 2: lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 1934.818699] ext2: Unknown parameter 'dont_measure' 01:05:26 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:26 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:26 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, 0x0) 01:05:26 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 1934.901240] loop6: detected capacity change from 0 to 16372 [ 1934.907580] ext2: Unknown parameter 'dont_measure' [ 1934.923084] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1934.926305] loop3: detected capacity change from 0 to 16372 [ 1934.929446] ext2: Unknown parameter 'dont_measure' 01:05:39 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:39 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, 0x0) 01:05:39 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:39 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:05:39 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:39 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:39 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52", 0x28) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:39 executing program 2: execve(0x0, 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 1947.648307] loop5: detected capacity change from 0 to 16372 [ 1947.670411] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1947.672351] ext2: Unknown parameter 'dont_measure' [ 1947.677267] loop7: detected capacity change from 0 to 16372 [ 1947.685915] loop6: detected capacity change from 0 to 16372 [ 1947.689425] loop3: detected capacity change from 0 to 16372 [ 1947.694345] ext2: Unknown parameter 'dont_measure' [ 1947.697097] ext2: Unknown parameter 'dont_measure' [ 1947.699283] ext2: Unknown parameter 'subj_type' 01:05:39 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, 0x0) 01:05:39 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:05:39 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:39 executing program 2: execve(0x0, 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:05:39 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1947.882827] loop5: detected capacity change from 0 to 16372 [ 1947.900580] ext2: Unknown parameter 'dont_measure' [ 1947.910182] loop6: detected capacity change from 0 to 16372 [ 1947.914189] loop3: detected capacity change from 0 to 16372 [ 1947.918427] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1947.922393] ext2: Unknown parameter 'dont_measure' [ 1947.926072] ext2: Unknown parameter 'dont_measure' 01:05:51 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:51 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1960.472964] loop6: detected capacity change from 0 to 16372 [ 1960.475301] loop7: detected capacity change from 0 to 16372 [ 1960.476657] ext2: Unknown parameter 'subj_type' [ 1960.485807] ext2: Unknown parameter 'dont_measure' 01:05:52 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:52 executing program 2: execve(0x0, 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:05:52 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:05:52 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52", 0x28) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:52 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:52 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)={[{@resuid}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1960.486786] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1960.490064] loop3: detected capacity change from 0 to 16372 [ 1960.491250] ext2: Unknown parameter 'dont_measure' [ 1960.525880] loop5: detected capacity change from 0 to 16372 [ 1960.532835] ext2: Unknown parameter 'dont_measure' 01:05:52 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:52 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:05:52 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[0x0, 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:52 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:05:52 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) [ 1960.605329] loop3: detected capacity change from 0 to 16372 [ 1960.612171] ext2: Unknown parameter 'dont_measure' 01:05:52 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:05:52 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf1", 0xe, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 1960.646261] loop6: detected capacity change from 0 to 16372 [ 1960.650541] ext2: Unknown parameter 'dont_measure' [ 1960.712776] loop7: detected capacity change from 0 to 16372 [ 1960.728568] ext2: Unknown parameter 'subj_type' [ 1960.760702] loop5: detected capacity change from 0 to 16372 [ 1960.764950] ext2: Unknown parameter 'dont_measure' 01:06:12 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850", 0x3c) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:06:12 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:12 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:12 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:06:12 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:12 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:06:12 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}]}) 01:06:12 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[0x0, 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1980.713961] loop7: detected capacity change from 0 to 16372 [ 1980.719451] loop5: detected capacity change from 0 to 16372 [ 1980.725328] loop6: detected capacity change from 0 to 16372 [ 1980.725992] loop3: detected capacity change from 0 to 16372 [ 1980.730772] ext2: Unknown parameter 'dont_measure' [ 1980.733244] ext2: Unknown parameter 'dont_measure' [ 1980.734565] ext2: Unknown parameter 'dont_measure' [ 1980.735761] ext2: Unknown parameter 'subj_type' 01:06:12 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:12 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}]}) 01:06:12 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:06:12 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:12 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[0x0, 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:12 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1980.930427] loop5: detected capacity change from 0 to 16372 [ 1980.943949] ext2: Unknown parameter 'dont_measure' [ 1980.954201] loop7: detected capacity change from 0 to 16372 [ 1980.955568] loop3: detected capacity change from 0 to 16372 [ 1980.964283] ext2: Unknown parameter 'subj_type' [ 1980.968806] ext2: Unknown parameter 'dont_measure' [ 1980.988122] loop6: detected capacity change from 0 to 16372 [ 1981.001358] ext2: Unknown parameter 'dont_measure' 01:06:25 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:06:25 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}]}) 01:06:25 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:25 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:25 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850", 0x3c) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:06:25 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:25 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:25 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 1994.455587] loop5: detected capacity change from 0 to 16372 [ 1994.460851] loop3: detected capacity change from 0 to 16372 [ 1994.462080] ext2: Unknown parameter 'dont_measure' [ 1994.464124] ext2: Unknown parameter 'dont_measure' 01:06:26 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) [ 1994.515371] loop7: detected capacity change from 0 to 16372 [ 1994.516520] ext2: Unknown parameter 'subj_type' [ 1994.520940] loop6: detected capacity change from 0 to 16372 [ 1994.523160] ext2: Unknown parameter 'dont_measure' 01:06:26 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:26 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:26 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:06:26 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 1994.607490] loop3: detected capacity change from 0 to 16372 01:06:26 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:26 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 1994.636157] ext2: Unknown parameter 'dont_measure' [ 1994.647256] loop5: detected capacity change from 0 to 16372 [ 1994.658058] ext2: Unknown parameter 'dont_measure' 01:06:26 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:06:26 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) [ 1994.704046] loop7: detected capacity change from 0 to 16372 [ 1994.708514] ext2: Unknown parameter 'subj_type' [ 1994.718124] loop6: detected capacity change from 0 to 16372 [ 1994.732758] ext2: Unknown parameter 'dont_measure' 01:06:39 executing program 4: open$dir(0x0, 0x0, 0x0) chmod(0x0, 0x0) execve(0x0, 0x0, 0x0) rmdir(0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1}], 0x0, &(0x7f0000000f40)) 01:06:39 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 2007.697343] loop5: detected capacity change from 0 to 16372 [ 2007.706478] loop6: detected capacity change from 0 to 16372 [ 2007.707797] ext2: Unknown parameter 'dont_measure' [ 2007.707821] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 2007.708843] ext2: Unknown parameter 'dont_measure' 01:06:39 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}}, 0x8000080) 01:06:39 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:39 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850", 0x3c) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:06:39 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:39 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:39 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2007.714571] loop3: detected capacity change from 0 to 16372 [ 2007.715702] ext2: Unknown parameter 'dont_measure' [ 2007.763106] loop7: detected capacity change from 0 to 16372 01:06:39 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:39 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:39 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2007.771355] ext2: Unknown parameter 'subj_type' 01:06:39 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 2007.828705] loop6: detected capacity change from 0 to 16372 [ 2007.833171] loop3: detected capacity change from 0 to 16372 [ 2007.835402] ext2: Unknown parameter 'dont_measure' [ 2007.839048] ext2: Unknown parameter 'dont_measure' [ 2007.842444] ext2: Unknown parameter 'dont_measure' [ 2007.886966] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 01:06:39 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2007.987385] loop7: detected capacity change from 0 to 16372 [ 2007.990199] ext2: Unknown parameter 'subj_type' 01:06:52 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:52 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:52 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:06:52 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:52 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2021.374558] loop3: detected capacity change from 0 to 16372 01:06:52 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:06:52 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}}, 0x8000080) 01:06:52 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f8", 0x46) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 2021.389797] ext2: Unknown parameter 'dont_measure' [ 2021.401971] ext2: Unknown parameter 'dont_measure' [ 2021.411538] loop6: detected capacity change from 0 to 16372 [ 2021.422580] loop7: detected capacity change from 0 to 16372 [ 2021.423883] ext2: Unknown parameter 'subj_type' [ 2021.430854] ext2: Unknown parameter 'dont_measure' 01:06:53 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}}, 0x8000080) 01:06:53 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:06:53 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:53 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2021.560427] ext2: Unknown parameter 'dont_measure' 01:06:53 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:53 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:53 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f8", 0x46) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 2021.588205] loop7: detected capacity change from 0 to 16372 [ 2021.592742] ext2: Unknown parameter 'subj_type' [ 2021.599018] loop6: detected capacity change from 0 to 16372 [ 2021.603877] loop3: detected capacity change from 0 to 16372 [ 2021.608548] ext2: Unknown parameter 'dont_measure' [ 2021.610751] ext2: Unknown parameter 'dont_measure' 01:06:53 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{0x0, 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:06:53 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:06:53 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:53 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:06:53 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:06:53 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x0) [ 2021.729714] loop7: detected capacity change from 0 to 16372 [ 2021.730425] loop3: detected capacity change from 0 to 16372 [ 2021.740909] ext2: Unknown parameter 'dont_measure' [ 2021.742462] ext2: Unknown parameter 'subj_type' 01:07:07 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:07 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x0) 01:07:07 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:07 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f8", 0x46) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:07:07 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) 01:07:07 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:07:07 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:07 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{0x0, 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2035.533328] loop6: detected capacity change from 0 to 16372 [ 2035.536515] ext2: Unknown parameter 'dont_measure' [ 2035.557466] loop7: detected capacity change from 0 to 16372 [ 2035.560011] ext2: Unknown parameter 'subj_type' 01:07:07 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2035.576825] loop3: detected capacity change from 0 to 16372 [ 2035.577919] ext2: Unknown parameter 'dont_measure' [ 2035.583037] loop5: detected capacity change from 0 to 16372 [ 2035.584758] ext2: Unknown parameter 'dont_measure' [ 2035.597757] No source specified 01:07:07 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb451", 0x4b) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 2035.637900] loop6: detected capacity change from 0 to 16372 01:07:07 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:07 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:07 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{0x0, 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2035.677932] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:07:07 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(0x0, &(0x7f0000002440), 0x0, 0x0, 0x0) [ 2035.692248] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2035.692944] Buffer I/O error on dev loop6, logical block 0, async page read [ 2035.693506] loop6: unable to read partition table [ 2035.696148] loop3: detected capacity change from 0 to 16372 [ 2035.700564] ext2: Unknown parameter 'dont_measure' [ 2035.701187] loop7: detected capacity change from 0 to 16372 [ 2035.704460] ext2: Unknown parameter 'subj_type' [ 2035.709192] loop6: partition table beyond EOD, truncated [ 2035.744804] loop5: detected capacity change from 0 to 16372 [ 2035.749572] ext2: Unknown parameter 'dont_measure' 01:07:07 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:07 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2035.809147] loop3: detected capacity change from 0 to 16372 [ 2035.813966] No source specified [ 2035.826279] ext2: Unknown parameter 'dont_measure' [ 2035.837862] loop7: detected capacity change from 0 to 16372 [ 2035.851459] ext2: Unknown parameter 'subj_type' [ 2049.451948] loop5: detected capacity change from 0 to 16372 [ 2049.453956] ext2: Unknown parameter 'dont_measure' 01:07:20 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:20 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:20 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(0x0, &(0x7f0000002440), 0x0, 0x0, 0x0) 01:07:20 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:07:20 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x0) 01:07:20 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb451", 0x4b) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:07:20 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:20 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 2049.467417] loop6: detected capacity change from 0 to 16372 [ 2049.468473] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2049.469928] No source specified [ 2049.489341] loop3: detected capacity change from 0 to 16372 [ 2049.491538] ext2: Unknown parameter 'dont_measure' [ 2049.501263] loop7: detected capacity change from 0 to 16372 01:07:21 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2049.524168] No source specified [ 2049.526670] ext2: Unknown parameter 'subj_type' 01:07:21 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:21 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2049.579975] loop6: detected capacity change from 0 to 16372 [ 2049.582198] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:07:21 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 2049.586035] loop5: detected capacity change from 0 to 16372 [ 2049.611409] ext2: Unknown parameter 'dont_measure' 01:07:21 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(0x0, &(0x7f0000002440), 0x0, 0x0, 0x0) 01:07:21 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2049.635010] No source specified 01:07:21 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440), 0x0, 0x0, 0x0) [ 2049.681987] loop6: detected capacity change from 0 to 16372 [ 2049.688923] loop3: detected capacity change from 0 to 16372 [ 2049.690049] ext2: Unknown parameter 'subj_type' [ 2049.697257] ext2: Unknown parameter 'dont_measure' 01:07:21 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2049.728112] No source specified [ 2049.744504] No source specified [ 2049.755917] loop7: detected capacity change from 0 to 16372 [ 2049.765229] ext2: Unknown parameter 'subj_type' [ 2062.331375] No source specified 01:07:33 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:07:33 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:33 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb451", 0x4b) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:07:33 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:33 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 01:07:33 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:07:33 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:33 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2062.338399] loop1: detected capacity change from 0 to 16372 [ 2062.344073] loop5: detected capacity change from 0 to 16372 [ 2062.345279] ext2: Unknown parameter 'dont_measure' [ 2062.349202] loop3: detected capacity change from 0 to 16372 [ 2062.350799] No source specified [ 2062.352316] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2062.358486] ext2: Unknown parameter 'dont_measure' [ 2062.371525] loop7: detected capacity change from 0 to 16372 [ 2062.373351] loop6: detected capacity change from 0 to 16372 [ 2062.374624] ext2: Unknown parameter 'subj_type' [ 2062.380830] ext2: Unknown parameter 'subj_type' 01:07:33 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3", 0x57, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:07:33 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 01:07:33 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:07:33 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2062.437170] No source specified [ 2062.448811] loop1: detected capacity change from 0 to 16372 [ 2062.452442] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:07:34 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:34 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2062.478249] loop5: detected capacity change from 0 to 16372 [ 2062.485903] ext2: Unknown parameter 'dont_measure' 01:07:34 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) lsetxattr$trusted_overlay_opaque(&(0x7f0000002400)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 01:07:34 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2062.509361] No source specified [ 2062.515178] loop3: detected capacity change from 0 to 16372 [ 2062.520649] ext2: Unknown parameter 'dont_measure' [ 2062.528399] loop6: detected capacity change from 0 to 16372 01:07:34 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2062.533790] No source specified [ 2062.534573] ext2: Unknown parameter 'subj_type' [ 2062.563979] loop7: detected capacity change from 0 to 16372 [ 2062.566398] loop1: detected capacity change from 0 to 16372 [ 2062.570404] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2062.584270] ext2: Unknown parameter 'subj_type' [ 2073.070492] loop6: detected capacity change from 0 to 16372 [ 2073.071759] No source specified [ 2073.072274] loop1: detected capacity change from 0 to 16372 [ 2073.073456] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2073.074059] loop5: detected capacity change from 0 to 16372 01:07:44 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:44 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3", 0x57, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:07:44 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:07:44 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145", 0x4d) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:07:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:07:44 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{0x0, 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:44 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(0x0, 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:44 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) [ 2073.080116] ext2: Unknown parameter 'dont_measure' [ 2073.082868] ext2: Unknown parameter 'dont_measure' [ 2073.084359] loop3: detected capacity change from 0 to 16372 [ 2073.086147] loop2: detected capacity change from 0 to 16372 [ 2073.087048] ext2: Unknown parameter 'dont_measure' [ 2073.087934] loop7: detected capacity change from 0 to 16372 [ 2073.089248] ext2: Unknown parameter 'subj_type' [ 2073.097251] ext2: Unknown parameter 'dont_measure' 01:07:44 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2073.182992] loop2: detected capacity change from 0 to 16372 [ 2073.184666] ext2: Unknown parameter 'dont_measure' 01:07:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:07:55 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{0x0, 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2083.593515] loop7: detected capacity change from 0 to 16372 01:07:55 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:07:55 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) 01:07:55 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3", 0x57, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:07:55 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145", 0x4d) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:07:55 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(0x0, 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:55 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2083.599157] loop3: detected capacity change from 0 to 16372 [ 2083.600756] loop1: detected capacity change from 0 to 16372 [ 2083.600924] ext2: Unknown parameter 'subj_type' [ 2083.604806] ext2: Unknown parameter 'dont_measure' [ 2083.613120] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2083.614932] loop2: detected capacity change from 0 to 16372 [ 2083.617170] ext2: Unknown parameter 'dont_measure' [ 2083.618470] loop6: detected capacity change from 0 to 16372 [ 2083.620709] ext2: Unknown parameter 'dont_measure' [ 2083.623319] loop5: detected capacity change from 0 to 16372 [ 2083.626551] No source specified [ 2083.631921] ext2: Unknown parameter 'dont_measure' 01:07:55 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{0x0, 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:55 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:07:55 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2083.727108] loop3: detected capacity change from 0 to 16372 [ 2083.728948] loop7: detected capacity change from 0 to 16372 [ 2083.732675] ext2: Unknown parameter 'dont_measure' [ 2083.741273] ext2: Unknown parameter 'subj_type' 01:07:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:07:55 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(0x0, 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:55 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') 01:07:55 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145", 0x4d) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 2083.782227] loop1: detected capacity change from 0 to 16372 [ 2083.783869] loop2: detected capacity change from 0 to 16372 [ 2083.789060] ext2: Unknown parameter 'dont_measure' [ 2083.791216] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2083.806025] loop6: detected capacity change from 0 to 16372 [ 2083.811042] No source specified [ 2083.815560] loop5: detected capacity change from 0 to 16372 01:07:55 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2083.821160] ext2: Unknown parameter 'dont_measure' [ 2083.825449] ext2: Unknown parameter 'dont_measure' 01:07:55 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:07:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2083.887242] loop2: detected capacity change from 0 to 16372 [ 2083.890970] ext2: Unknown parameter 'dont_measure' [ 2083.942583] loop3: detected capacity change from 0 to 16372 [ 2083.943727] ext2: Unknown parameter 'dont_measure' 01:08:07 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc", 0x4e) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:08:07 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) 01:08:07 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:07 executing program 4: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:08:07 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2095.839305] No source specified [ 2095.840380] loop6: detected capacity change from 0 to 16372 [ 2095.842553] ext2: Unknown parameter 'dont_measure' [ 2095.862213] loop7: detected capacity change from 0 to 16372 01:08:07 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:07 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2095.867212] ext2: Unknown parameter 'subj_type' [ 2095.873438] loop5: detected capacity change from 0 to 16372 [ 2095.877320] loop3: detected capacity change from 0 to 16372 [ 2095.878624] ext2: Unknown parameter 'dont_measure' [ 2095.879108] ext2: Unknown parameter 'dont_measure' [ 2095.884205] loop2: detected capacity change from 0 to 16372 01:08:07 executing program 4: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) [ 2095.893421] loop1: detected capacity change from 0 to 16372 [ 2095.896150] ext2: Unknown parameter 'dont_measure' [ 2095.901785] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:08:07 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2095.933934] No source specified 01:08:07 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2095.952850] loop6: detected capacity change from 0 to 16372 [ 2095.967498] ext2: Unknown parameter 'dont_measure' 01:08:07 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:07 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:07 executing program 2: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2095.996445] loop7: detected capacity change from 0 to 16372 [ 2096.008912] ext2: Unknown parameter 'subj_type' 01:08:07 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) 01:08:07 executing program 4: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:08:07 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc", 0x4e) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 2096.029151] loop3: detected capacity change from 0 to 16372 [ 2096.036222] loop5: detected capacity change from 0 to 16372 [ 2096.037427] ext2: Unknown parameter 'dont_measure' [ 2096.043028] ext2: Unknown parameter 'dont_measure' 01:08:07 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2096.076186] No source specified [ 2096.100391] loop2: detected capacity change from 0 to 16372 01:08:07 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2096.111696] ext2: Unknown parameter 'dont_measure' [ 2096.114805] loop1: detected capacity change from 0 to 16372 [ 2096.122266] loop7: detected capacity change from 0 to 16372 [ 2096.123444] ext2: Unknown parameter 'subj_type' [ 2096.126806] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2096.140777] loop6: detected capacity change from 0 to 16372 [ 2096.153325] ext2: Unknown parameter 'dont_measure' 01:08:19 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:08:19 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef7", 0x1a, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:19 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc", 0x4e) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:08:19 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) 01:08:19 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:19 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(0x0, 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:19 executing program 2: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2107.539318] loop3: detected capacity change from 0 to 16372 [ 2107.550032] ext2: Unknown parameter 'dont_measure' [ 2107.555196] loop6: detected capacity change from 0 to 16372 [ 2107.560777] loop7: detected capacity change from 0 to 16372 [ 2107.571735] ext2: Unknown parameter 'dont_measure' [ 2107.575100] ext2: Unknown parameter 'subj_type' [ 2107.579746] loop1: detected capacity change from 0 to 16372 [ 2107.582389] loop5: detected capacity change from 0 to 16372 [ 2107.582769] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2107.589059] loop2: detected capacity change from 0 to 16372 01:08:19 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f5", 0x2c, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2107.596960] ext2: Unknown parameter 'dont_measure' [ 2107.603839] ext2: Unknown parameter 'dont_measure' 01:08:19 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:08:19 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef7", 0x1a, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:19 executing program 2: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:19 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) 01:08:19 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(0x0, 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:19 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:19 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2107.785447] loop6: detected capacity change from 0 to 16372 [ 2107.793218] ext2: Unknown parameter 'dont_measure' [ 2107.796181] loop3: detected capacity change from 0 to 16372 [ 2107.799125] loop2: detected capacity change from 0 to 16372 [ 2107.806192] loop1: detected capacity change from 0 to 16372 [ 2107.806924] ext2: Unknown parameter 'dont_measure' [ 2107.809111] ext2: Unknown parameter 'dont_measure' [ 2107.820029] loop5: detected capacity change from 0 to 16372 [ 2107.822734] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2107.823220] loop7: detected capacity change from 0 to 16372 [ 2107.828304] ext2: Unknown parameter 'dont_measure' [ 2107.837629] ext2: Unknown parameter 'subj_type' 01:08:35 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:35 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:35 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:08:35 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef7", 0x1a, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:35 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x8000080) 01:08:35 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(0x0, 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:35 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2124.083364] loop7: detected capacity change from 0 to 16372 [ 2124.086344] ext2: Unknown parameter 'subj_type' 01:08:35 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) [ 2124.110826] loop2: detected capacity change from 0 to 16372 [ 2124.134539] loop6: detected capacity change from 0 to 16372 [ 2124.138874] loop1: detected capacity change from 0 to 16372 [ 2124.140028] loop3: detected capacity change from 0 to 16372 [ 2124.142916] ext2: Unknown parameter 'dont_measure' [ 2124.145189] loop5: detected capacity change from 0 to 16372 [ 2124.148296] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2124.152956] ext2: Unknown parameter 'dont_measure' [ 2124.153766] ext2: Unknown parameter 'dont_measure' 01:08:35 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:08:35 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:35 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:35 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x0) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:35 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:35 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:35 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682", 0x27, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2124.351364] loop6: detected capacity change from 0 to 16372 [ 2124.352065] loop7: detected capacity change from 0 to 16372 [ 2124.361234] loop2: detected capacity change from 0 to 16372 [ 2124.364091] loop1: detected capacity change from 0 to 16372 [ 2124.365399] ext2: Unknown parameter 'subj_type' [ 2124.367736] loop5: detected capacity change from 0 to 16372 [ 2124.369815] ext2: Unknown parameter 'dont_measure' [ 2124.372997] loop3: detected capacity change from 0 to 16372 [ 2124.374224] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2124.375048] ext2: Unknown parameter 'dont_measure' [ 2124.377909] ext2: Unknown parameter 'dont_measure' 01:08:35 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:08:35 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x8000080) [ 2139.599230] loop1: detected capacity change from 0 to 16372 [ 2139.601564] loop7: detected capacity change from 0 to 16372 [ 2139.604486] loop6: detected capacity change from 0 to 16372 [ 2139.604893] loop2: detected capacity change from 0 to 16372 01:08:51 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x0) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:51 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:51 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x8000080) 01:08:51 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)) 01:08:51 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:51 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{0x0, 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:51 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682", 0x27, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:51 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2139.611121] loop3: detected capacity change from 0 to 16372 [ 2139.612397] ext2: Unknown parameter 'subj_type' [ 2139.613204] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2139.614115] loop5: detected capacity change from 0 to 16372 [ 2139.614910] ext2: Unknown parameter 'dont_measure' [ 2139.615530] ext2: Unknown parameter 'dont_measure' [ 2139.615673] ext2: Unknown parameter 'dont_measure' 01:08:51 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:08:51 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:08:51 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2139.683049] loop2: detected capacity change from 0 to 16372 01:08:51 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x0) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:51 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2139.711171] ext2: Unknown parameter 'dont_measure' 01:08:51 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682", 0x27, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:08:51 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{0x0, 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2139.740016] loop3: detected capacity change from 0 to 16372 [ 2139.744645] loop7: detected capacity change from 0 to 16372 [ 2139.747474] ext2: Unknown parameter 'dont_measure' [ 2139.749966] loop6: detected capacity change from 0 to 16372 [ 2139.751349] ext2: Unknown parameter 'dont_measure' [ 2139.751946] ext2: Unknown parameter 'subj_type' 01:08:51 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2139.762091] loop1: detected capacity change from 0 to 16372 [ 2139.772694] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2139.804943] loop2: detected capacity change from 0 to 16372 01:09:02 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:02 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:09:02 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:02 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{0x0, 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:02 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:02 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(0x0, &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:02 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69", 0x2e, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:02 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2150.587522] loop7: detected capacity change from 0 to 16372 [ 2150.589566] loop1: detected capacity change from 0 to 16372 [ 2150.589737] ext2: Unknown parameter 'dont_measure' [ 2150.592516] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2150.592542] ext2: Unknown parameter 'subj_type' [ 2150.599546] loop3: detected capacity change from 0 to 16372 [ 2150.600654] ext2: Unknown parameter 'dont_measure' [ 2150.604567] loop2: detected capacity change from 0 to 16372 [ 2150.623468] loop6: detected capacity change from 0 to 16372 [ 2150.624767] ext2: Unknown parameter 'dont_measure' 01:09:02 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:02 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69", 0x2e, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:02 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:02 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(0x0, &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:02 executing program 1: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:02 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:02 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2150.729332] loop7: detected capacity change from 0 to 16372 [ 2150.740405] ext2: Unknown parameter 'dont_measure' [ 2150.740939] loop3: detected capacity change from 0 to 16372 [ 2150.746547] ext2: Unknown parameter 'dont_measure' [ 2150.753049] loop1: detected capacity change from 0 to 16372 [ 2150.754188] ext2: Unknown parameter 'subj_type' [ 2150.756176] ext2: Unknown parameter 'dont_measure' [ 2150.763083] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2150.767100] loop6: detected capacity change from 0 to 16372 [ 2150.771474] ext2: Unknown parameter 'dont_measure' 01:09:02 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2150.830025] ext2: Unknown parameter 'dont_measure' 01:09:16 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69", 0x2e, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:16 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:16 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:09:16 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(0x0, &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:16 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:16 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:16 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2165.178063] ext2: Unknown parameter 'dont_measure' 01:09:16 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:16 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440), 0x0, 0x5}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2165.229063] loop3: detected capacity change from 0 to 16372 [ 2165.238559] ext2: Unknown parameter 'dont_measure' [ 2165.246300] loop1: detected capacity change from 0 to 16372 [ 2165.248364] loop5: detected capacity change from 0 to 16372 [ 2165.252918] ext2: Unknown parameter 'dont_measure' [ 2165.258055] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2165.261188] loop6: detected capacity change from 0 to 16372 [ 2165.264387] loop7: detected capacity change from 0 to 16372 [ 2165.265845] ext2: Unknown parameter 'dont_measure' [ 2165.282799] ext2: Unknown parameter 'subj_type' [ 2165.308797] loop2: detected capacity change from 0 to 16372 [ 2165.314264] ext2: Unknown parameter 'dont_measure' 01:09:16 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, 0x0) 01:09:16 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:16 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c53", 0x31, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:16 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:16 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2165.462273] loop3: detected capacity change from 0 to 16372 [ 2165.468434] ext2: Unknown parameter 'dont_measure' [ 2165.476356] loop1: detected capacity change from 0 to 16372 [ 2165.476474] loop5: detected capacity change from 0 to 16372 [ 2165.492746] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2165.508459] loop6: detected capacity change from 0 to 16372 [ 2165.514757] ext2: Unknown parameter 'dont_measure' [ 2178.334846] loop1: detected capacity change from 0 to 16372 [ 2178.336344] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2178.338518] loop5: detected capacity change from 0 to 16372 01:09:29 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:29 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:29 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, 0x0) 01:09:29 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:29 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:29 executing program 1: execve(0x0, &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:29 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:09:29 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c53", 0x31, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2178.361385] loop3: detected capacity change from 0 to 16372 [ 2178.363687] loop6: detected capacity change from 0 to 16372 [ 2178.365154] ext2: Unknown parameter 'dont_measure' 01:09:29 executing program 1: execve(0x0, &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2178.377243] loop7: detected capacity change from 0 to 16372 [ 2178.379934] ext2: Unknown parameter 'dont_measure' [ 2178.391472] loop2: detected capacity change from 0 to 16372 [ 2178.398765] ext2: Unknown parameter 'subj_type' [ 2178.405774] ext2: Unknown parameter 'dont_measure' 01:09:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2178.433518] loop1: detected capacity change from 0 to 16372 [ 2178.438112] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:09:30 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:30 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, 0x0) 01:09:30 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:30 executing program 1: execve(0x0, &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:30 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c53", 0x31, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:30 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef7", 0x1a, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2178.542373] loop5: detected capacity change from 0 to 16372 [ 2178.545399] loop6: detected capacity change from 0 to 16372 [ 2178.547314] ext2: Unknown parameter 'dont_measure' [ 2178.555059] ext2: Unknown parameter 'dont_measure' 01:09:30 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 2178.569804] loop1: detected capacity change from 0 to 16372 [ 2178.574253] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2178.586695] loop7: detected capacity change from 0 to 16372 [ 2178.587518] loop3: detected capacity change from 0 to 16372 [ 2178.592730] ext2: Unknown parameter 'subj_type' [ 2178.600979] ext2: Unknown parameter 'dont_measure' 01:09:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:30 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:30 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:30 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:30 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2178.690874] loop1: detected capacity change from 0 to 16372 [ 2178.692445] loop5: detected capacity change from 0 to 16372 [ 2178.694065] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2178.710631] loop7: detected capacity change from 0 to 16372 [ 2178.714311] ext2: Unknown parameter 'subj_type' [ 2178.729869] ext2: Unknown parameter 'dont_measure' [ 2178.732866] ext2: Unknown parameter 'dont_measure' 01:09:41 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:41 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2189.560664] loop1: detected capacity change from 0 to 16372 01:09:41 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:09:41 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c77", 0x33, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:41 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:41 executing program 4: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:41 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:41 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2189.583102] loop7: detected capacity change from 0 to 16372 [ 2189.584235] ext2: Unknown parameter 'subj_type' [ 2189.585810] loop5: detected capacity change from 0 to 16372 [ 2189.586932] ext2: Unknown parameter 'dont_measure' [ 2189.588786] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2189.601763] loop6: detected capacity change from 0 to 16372 [ 2189.602970] ext2: Unknown parameter 'dont_measure' [ 2189.611455] loop3: detected capacity change from 0 to 16372 [ 2189.620417] ext2: Unknown parameter 'dont_measure' [ 2189.622231] ext2: Unknown parameter 'dont_measure' 01:09:41 executing program 4: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:41 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:41 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:41 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0), 0x0, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:41 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0, 0x0, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2189.681083] loop5: detected capacity change from 0 to 16372 [ 2189.693393] ext2: Unknown parameter 'dont_measure' [ 2189.705241] loop1: detected capacity change from 0 to 16372 [ 2189.706369] loop7: detected capacity change from 0 to 16372 [ 2189.709092] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2189.710405] ext2: Unknown parameter 'subj_type' [ 2189.715098] loop5: unable to read partition table [ 2189.719495] loop5: partition table beyond EOD, truncated [ 2189.732888] loop2: detected capacity change from 0 to 16372 [ 2189.733946] ext2: Unknown parameter 'dont_measure' 01:09:51 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:09:51 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c77", 0x33, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:51 executing program 4: execve(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2200.218839] loop5: detected capacity change from 0 to 16372 01:09:51 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:51 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0, 0x0, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:51 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:09:51 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b", 0xd, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:51 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2200.238089] loop6: detected capacity change from 0 to 16372 [ 2200.239251] ext2: Unknown parameter 'dont_measure' [ 2200.242082] loop7: detected capacity change from 0 to 16372 [ 2200.243298] ext2: Unknown parameter 'subj_type' [ 2200.250366] loop1: detected capacity change from 0 to 16372 [ 2200.251012] ext2: Unknown parameter 'dont_measure' [ 2200.254341] loop2: detected capacity change from 0 to 16372 [ 2200.258424] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2200.262192] ext2: Unknown parameter 'dont_measure' [ 2200.263195] loop3: detected capacity change from 0 to 16372 [ 2200.265853] ext2: Unknown parameter 'dont_measure' 01:09:51 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:09:51 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:09:51 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2200.353051] loop6: detected capacity change from 0 to 16372 [ 2200.359575] ext2: Unknown parameter 'dont_measure' [ 2200.400262] loop5: detected capacity change from 0 to 16372 [ 2200.404908] ext2: Unknown parameter 'dont_measure' 01:10:06 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:06 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b", 0xd, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:06 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:10:06 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:06 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c77", 0x33, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:06 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:10:06 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:06 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0, 0x0, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2214.498110] loop1: detected capacity change from 0 to 16372 [ 2214.500741] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2214.504574] loop6: detected capacity change from 0 to 16372 [ 2214.506171] ext2: Unknown parameter 'dont_measure' [ 2214.527860] loop7: detected capacity change from 0 to 16372 01:10:06 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2214.542447] ext2: Unknown parameter 'subj_type' [ 2214.551559] loop3: detected capacity change from 0 to 16372 [ 2214.552001] loop6: detected capacity change from 0 to 16372 [ 2214.552964] loop2: detected capacity change from 0 to 16372 [ 2214.553489] ext2: Unknown parameter 'dont_measure' [ 2214.555422] loop5: detected capacity change from 0 to 16372 [ 2214.566955] ext2: Unknown parameter 'dont_measure' [ 2214.570338] ext2: Unknown parameter 'dont_measure' [ 2214.574002] ext2: Unknown parameter 'dont_measure' 01:10:06 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', 0x0], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2214.589782] loop6: detected capacity change from 0 to 16372 [ 2214.590975] ext2: Unknown parameter 'dont_measure' 01:10:06 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:06 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2214.654645] loop6: detected capacity change from 0 to 16372 01:10:06 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2214.660000] ext2: Unknown parameter 'dont_measure' 01:10:06 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:06 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:06 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b", 0xd, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:06 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2214.739907] loop1: detected capacity change from 0 to 16372 01:10:06 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2214.748104] loop5: detected capacity change from 0 to 16372 [ 2214.749409] ext2: Unknown parameter 'dont_measure' [ 2214.751275] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:10:06 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 2214.766933] loop2: detected capacity change from 0 to 16372 [ 2214.772697] loop3: detected capacity change from 0 to 16372 [ 2214.781059] ext2: Unknown parameter 'dont_measure' [ 2214.783785] loop7: detected capacity change from 0 to 16372 [ 2214.784135] ext2: Unknown parameter 'dont_measure' 01:10:06 executing program 4: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2214.787629] loop6: detected capacity change from 0 to 16372 [ 2214.791462] ext2: Unknown parameter 'dont_measure' [ 2214.796429] ext2: Unknown parameter 'subj_type' 01:10:06 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:06 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2214.897935] loop6: detected capacity change from 0 to 16372 [ 2214.902174] ext2: Unknown parameter 'dont_measure' [ 2214.913843] loop3: detected capacity change from 0 to 16372 [ 2214.919989] ext2: Unknown parameter 'dont_measure' 01:10:20 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:20 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:10:20 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:20 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143", 0x14, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:20 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:20 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2228.589028] loop5: detected capacity change from 0 to 16372 [ 2228.590241] ext2: Unknown parameter 'dont_measure' 01:10:20 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:10:20 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', 0x0, &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2228.594875] loop6: detected capacity change from 0 to 16372 [ 2228.609080] ext2: Unknown parameter 'dont_measure' [ 2228.621430] loop7: detected capacity change from 0 to 16372 [ 2228.623398] loop3: detected capacity change from 0 to 16372 [ 2228.626135] ext2: Unknown parameter 'subj_type' [ 2228.630502] ext2: Unknown parameter 'dont_measure' [ 2228.642197] loop1: detected capacity change from 0 to 16372 [ 2228.643253] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2228.645435] loop2: detected capacity change from 0 to 16372 [ 2228.653960] ext2: Unknown parameter 'dont_measure' [ 2239.971601] loop3: detected capacity change from 0 to 16372 01:10:31 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:31 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:10:31 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', 0x0, &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:31 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:31 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={0x0}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:10:31 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a", 0xe, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:31 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x0, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2239.981513] ext2: Unknown parameter 'dont_measure' [ 2239.983022] loop2: detected capacity change from 0 to 16372 [ 2239.984221] ext2: Unknown parameter 'dont_measure' [ 2239.991674] loop5: detected capacity change from 0 to 16372 [ 2240.001899] loop7: detected capacity change from 0 to 16372 [ 2240.003047] ext2: Unknown parameter 'subj_type' [ 2240.003731] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 2240.004446] loop1: detected capacity change from 0 to 16372 [ 2240.004951] ext2: Unknown parameter 'dont_measure' [ 2240.020907] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:10:31 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380), 0x0, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2240.045790] loop6: detected capacity change from 0 to 16372 01:10:31 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3", 0x57, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2240.056709] ext2: Unknown parameter 'dont_measure' 01:10:31 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x0, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:31 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2240.101769] loop5: detected capacity change from 0 to 16372 01:10:31 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd89741", 0x8, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2240.106172] ext2: Unknown parameter 'dont_measure' [ 2240.107440] loop3: detected capacity change from 0 to 16372 [ 2240.110810] ext2: Unknown parameter 'dont_measure' [ 2240.117379] loop2: detected capacity change from 0 to 16372 [ 2240.123383] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 01:10:31 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2240.138513] ext2: Unknown parameter 'dont_measure' 01:10:31 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2240.168516] loop7: detected capacity change from 0 to 16372 01:10:31 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x0, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2240.200293] ext2: Unknown parameter 'subj_type' [ 2240.202031] loop5: detected capacity change from 0 to 16372 [ 2240.204256] ext2: Unknown parameter 'dont_measure' 01:10:31 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', 0x0, &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:31 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) [ 2240.249916] loop1: detected capacity change from 0 to 16372 [ 2240.257756] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2240.265768] loop6: detected capacity change from 0 to 16372 [ 2240.270162] ext2: Unknown parameter 'dont_measure' 01:10:31 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2240.299632] loop2: detected capacity change from 0 to 16372 [ 2240.303827] ext2: Unknown parameter 'dont_measure' 01:10:44 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={0x0}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:10:44 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() 01:10:44 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:44 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd89741", 0x8, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:44 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:44 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:44 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2252.860926] loop6: detected capacity change from 0 to 16372 [ 2252.866376] loop5: detected capacity change from 0 to 16372 01:10:44 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, 0x0) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2252.872193] ext2: Unknown parameter 'dont_measure' [ 2252.874625] loop2: detected capacity change from 0 to 16372 [ 2252.877745] loop3: detected capacity change from 0 to 16372 [ 2252.881853] loop7: detected capacity change from 0 to 16372 [ 2252.888184] ext2: Unknown parameter 'dont_measure' [ 2252.890184] ext2: Unknown parameter 'dont_measure' [ 2252.893544] ext2: Unknown parameter 'subj_type' [ 2252.895021] ext2: Unknown parameter 'dont_measure' [ 2252.896724] loop1: detected capacity change from 0 to 16372 [ 2252.921695] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:10:44 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={0x0}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:10:44 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) 01:10:44 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:44 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:44 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:44 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2253.022106] loop5: detected capacity change from 0 to 16372 [ 2253.023731] ext2: Unknown parameter 'dont_measure' 01:10:44 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd89741", 0x8, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:44 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, 0x0) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2253.058733] loop6: detected capacity change from 0 to 16372 [ 2253.062101] loop2: detected capacity change from 0 to 16372 [ 2253.070116] ext2: Unknown parameter 'dont_measure' [ 2253.071884] ext2: Unknown parameter 'dont_measure' 01:10:44 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2253.092067] loop7: detected capacity change from 0 to 16372 [ 2253.096477] ext2: Unknown parameter 'subj_type' [ 2253.114672] loop1: detected capacity change from 0 to 16372 01:10:44 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) [ 2253.149535] loop5: detected capacity change from 0 to 16372 [ 2253.152249] ext2: Unknown parameter 'dont_measure' [ 2253.165095] loop3: detected capacity change from 0 to 16372 [ 2253.167548] ext2: Unknown parameter 'dont_measure' 01:10:57 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, 0x0) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:57 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f5", 0x2c, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2265.728127] loop2: detected capacity change from 0 to 16372 [ 2265.731820] ext2: Unknown parameter 'dont_measure' [ 2265.747395] loop7: detected capacity change from 0 to 16372 [ 2265.750079] loop6: detected capacity change from 0 to 16372 [ 2265.751196] ext2: Unknown parameter 'dont_measure' 01:10:57 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) 01:10:57 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:10:57 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b7", 0x2, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:57 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:10:57 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:57 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2265.755193] ext2: Unknown parameter 'subj_type' [ 2265.756408] loop3: detected capacity change from 0 to 16372 [ 2265.758347] loop1: detected capacity change from 0 to 16372 [ 2265.772484] ext2: Unknown parameter 'dont_measure' [ 2265.777139] loop5: detected capacity change from 0 to 16372 01:10:57 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', 0x0, &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2265.791856] ext2: Unknown parameter 'dont_measure' 01:10:57 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b7", 0x2, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2265.819213] loop6: detected capacity change from 0 to 16372 [ 2265.821208] ext2: Unknown parameter 'dont_measure' [ 2265.822531] loop7: detected capacity change from 0 to 16372 [ 2265.824217] ext2: Unknown parameter 'subj_type' 01:10:57 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) 01:10:57 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:10:57 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 01:10:57 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f5", 0x2c, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2265.928520] loop2: detected capacity change from 0 to 16372 [ 2265.931066] ext2: Unknown parameter 'dont_measure' [ 2265.950564] loop5: detected capacity change from 0 to 16372 [ 2265.951695] ext2: Unknown parameter 'dont_measure' [ 2265.961855] loop1: detected capacity change from 0 to 16372 01:11:09 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:09 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:11:09 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b7", 0x2, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:09 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 01:11:09 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:09 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f5", 0x2c, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:09 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) 01:11:09 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', 0x0, &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2278.370438] loop3: detected capacity change from 0 to 16372 [ 2278.372029] ext2: Unknown parameter 'dont_measure' [ 2278.381561] loop7: detected capacity change from 0 to 16372 [ 2278.385465] ext2: Unknown parameter 'subj_type' [ 2278.395211] loop5: detected capacity change from 0 to 16372 [ 2278.402491] loop6: detected capacity change from 0 to 16372 [ 2278.404559] loop1: detected capacity change from 0 to 16372 [ 2278.406651] ext2: Unknown parameter 'dont_measure' [ 2278.407121] ext2: Unknown parameter 'dont_measure' [ 2278.425042] loop2: detected capacity change from 0 to 16372 [ 2278.434170] ext2: Unknown parameter 'dont_measure' 01:11:10 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:10 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64b", 0x5, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:10 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 01:11:10 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 01:11:10 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', 0x0, &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:10 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:10 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b29855", 0x42, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2278.526990] loop3: detected capacity change from 0 to 16372 [ 2278.531152] loop7: detected capacity change from 0 to 16372 [ 2278.538351] loop6: detected capacity change from 0 to 16372 [ 2278.540454] ext2: Unknown parameter 'dont_measure' [ 2278.542760] loop1: detected capacity change from 0 to 16372 [ 2278.544043] ext2: Unknown parameter 'subj_type' [ 2278.545415] ext2: Unknown parameter 'dont_measure' [ 2278.557412] loop5: detected capacity change from 0 to 16372 [ 2278.568991] ext2: Unknown parameter 'dont_measure' 01:11:10 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:10 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:10 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:10 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b7", 0x2, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2278.638094] loop2: detected capacity change from 0 to 16372 [ 2278.647241] ext2: Unknown parameter 'dont_measure' [ 2278.649982] loop1: detected capacity change from 0 to 16372 [ 2278.651388] loop6: detected capacity change from 0 to 16372 [ 2278.657877] ext2: Unknown parameter 'dont_measure' [ 2278.682327] loop7: detected capacity change from 0 to 16372 [ 2278.683362] ext2: Unknown parameter 'subj_type' 01:11:21 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:21 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) 01:11:22 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:21 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}]}) 01:11:22 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:11:21 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b29855", 0x42, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:21 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:21 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2290.509711] loop3: detected capacity change from 0 to 16372 [ 2290.513238] loop1: detected capacity change from 0 to 16372 [ 2290.516000] loop5: detected capacity change from 0 to 16372 [ 2290.520672] loop6: detected capacity change from 0 to 16372 [ 2290.522903] ext2: Unknown parameter 'dont_measure' [ 2290.524195] ext2: Unknown parameter 'dont_measure' [ 2290.527200] loop7: detected capacity change from 0 to 16372 [ 2290.528135] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2290.531065] ext2: Unknown parameter 'dont_measure' [ 2290.534059] ext2: Unknown parameter 'subj_type' [ 2290.537044] loop2: detected capacity change from 0 to 16372 [ 2290.540316] ext2: Unknown parameter 'dont_measure' 01:11:22 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) 01:11:22 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}]}) 01:11:22 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:22 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c", 0x2d, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:22 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:22 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:22 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2290.731399] loop7: detected capacity change from 0 to 16372 [ 2290.735893] loop2: detected capacity change from 0 to 16372 [ 2290.736513] loop5: detected capacity change from 0 to 16372 [ 2290.740222] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2290.743912] ext2: Unknown parameter 'dont_measure' [ 2290.748214] loop6: detected capacity change from 0 to 16372 [ 2290.748237] ext2: Unknown parameter 'subj_type' [ 2290.750810] ext2: Unknown parameter 'dont_measure' [ 2290.756142] loop3: detected capacity change from 0 to 16372 [ 2290.762960] ext2: Unknown parameter 'dont_measure' [ 2290.764870] ext2: Unknown parameter 'dont_measure' 01:11:35 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) 01:11:35 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:35 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', 0x0, &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:35 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:11:35 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d", 0x18, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:35 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:35 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}]}) 01:11:35 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)='A', 0x1, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2304.092747] loop3: detected capacity change from 0 to 16372 [ 2304.098230] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2304.101045] loop5: detected capacity change from 0 to 16372 [ 2304.102913] loop2: detected capacity change from 0 to 16372 [ 2304.103131] ext2: Unknown parameter 'dont_measure' [ 2304.105101] loop6: detected capacity change from 0 to 16372 [ 2304.107743] loop7: detected capacity change from 0 to 16372 [ 2304.112047] ext2: Unknown parameter 'dont_measure' [ 2304.113399] ext2: Unknown parameter 'dont_measure' [ 2304.113793] ext2: Unknown parameter 'dont_measure' [ 2304.115548] ext2: Unknown parameter 'subj_type' 01:11:35 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:35 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) getpgid(r3) 01:11:35 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d", 0x18, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:35 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}]}) 01:11:35 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', 0x0, &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:35 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:35 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b7", 0x2}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2304.303688] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2304.309171] loop2: detected capacity change from 0 to 16372 [ 2304.318405] loop5: detected capacity change from 0 to 16372 [ 2304.320262] loop6: detected capacity change from 0 to 16372 [ 2304.322346] ext2: Unknown parameter 'dont_measure' [ 2304.324007] ext2: Unknown parameter 'dont_measure' [ 2304.324122] ext2: Unknown parameter 'dont_measure' [ 2304.340898] loop3: detected capacity change from 0 to 16372 [ 2304.355055] ext2: Unknown parameter 'dont_measure' 01:11:35 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 2304.422008] loop7: detected capacity change from 0 to 16372 [ 2304.427611] ext2: Unknown parameter 'subj_type' [ 2304.461848] loop1: detected capacity change from 0 to 16372 [ 2304.472382] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:11:47 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) getpgid(r3) 01:11:47 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:47 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b7", 0x2}], 0x0, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:47 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) r4 = getpgid(r3) waitid(0x3, r4, &(0x7f0000000180), 0x4, &(0x7f0000000200)) inotify_rm_watch(r2, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@md5={0x1, "806fc4805b27291695db16380944d17b"}, 0x11, 0x1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x0, 0x12, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1b5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80080) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000480)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v1={0x2, "0630bd96"}, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) setsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f00000005c0)="7a1d44c71423e7e39d6666b196bd64709718ced2f84c4a782e537ab862335b8724bb77d06dd1fd52fabd22572c8d25e1e5eab3360f68130d12b96850bb0a2586a975f1f8b1f852518cb4510145bc6d", 0x4f) fork() sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x7c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x68080}, 0x8000080) 01:11:47 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}]}) [ 2315.606304] loop7: detected capacity change from 0 to 16372 01:11:47 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d", 0x18, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:47 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:47 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', 0x0, &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:47 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) r3 = getpgrp(0xffffffffffffffff) ioctl$BINDER_GET_FROZEN_INFO(r2, 0xc00c620f, &(0x7f0000000140)={r3}) [ 2315.626428] loop2: detected capacity change from 0 to 16372 [ 2315.627850] ext2: Unknown parameter 'dont_measure' [ 2315.631023] ext2: Unknown parameter 'subj_type' [ 2315.632118] loop6: detected capacity change from 0 to 16372 [ 2315.637563] ext2: Unknown parameter 'dont_measure' [ 2315.659463] loop1: detected capacity change from 0 to 16372 [ 2315.662340] loop5: detected capacity change from 0 to 16372 [ 2315.665384] loop3: detected capacity change from 0 to 16372 [ 2315.666412] ext2: Unknown parameter 'dont_measure' [ 2315.669004] ext2: Unknown parameter 'dont_measure' [ 2315.672305] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2315.677505] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 01:11:47 executing program 2: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61", 0x23, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:47 executing program 6: lgetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/56, 0x38) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000140)='^,/)!\x00', 0x0, &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483d30580440a65b1f9275cc6cf221d40f9f5cd2b70257758fde19a54b78d0eee0267fb252ed9f04ace5fb141ba9c6b24fbd83cffd35ba84be264f336b69e83a7aedf32a84c8c27186b3588f3051794e35e7e77a1e18cb1af2883a2b80ec8eeb37ed9c464f4bccd8e63f4b37dfa0eedae5ee5a6e2c1beb64552b42c5978fcb8f2a5292f179ca4bf64c4441bd9f025b397d6bfbba9988bb0ec88b09dafb9207650cb", 0xd9, 0x5}, {&(0x7f0000000540)="ffa386b8adef5089b487f5422adb89f2ee9181408e5bec2ba86b8e174f5955549756b87fcacb42f259a4d893556cc902e0282c1f71ad42305cb8c2c27839045c68218fd5b684f110eb1787859611a395ddea4b9de25486483c8e97fd3b2313b6ecdc90f9f905fc58b485435081c9d93280d6650103b78477a61d2d95c435e8382497b9da55e43ad9262fbdf5ff9272a5f8392d3c068ca722c08800101f37c50012fa96de7fa6daf249647ff17ac64ff6de", 0xb1, 0x8}, {&(0x7f0000000600)="94ac01e762a88388b4b340194bda76722f720d07cb4dabff01af60f0398f656ee0af2ff7db3dec38180530a7aea866743e07d34b96cee816501c3ab8e871c3242d08ebab4de3bece9e0bd8815c4dd30ea6e02d65a8186a13a9309c1f65b667da85da43dc51fe6cd95665446b", 0x6c, 0x7ff}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) mount_setattr(0xffffffffffffffff, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:47 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) getpgrp(0xffffffffffffffff) [ 2315.746352] loop6: detected capacity change from 0 to 16372 [ 2315.748699] loop2: detected capacity change from 0 to 16372 [ 2315.751950] ext2: Unknown parameter 'dont_measure' [ 2315.755175] ext2: Unknown parameter 'dont_measure' 01:11:47 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)='^\\*@\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}, {0x0, 0x0, 0x8}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='root', &(0x7f0000000980)='-\xc9\x00', &(0x7f00000009c0)='-,\x00', &(0x7f0000000a00)='#((\x00'], &(0x7f0000000b40)=[&(0x7f0000000a80)='@$\'-,^#\x00', &(0x7f0000000ac0)='fscontext', &(0x7f0000000b00)='fscontext']) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x40) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b76fd64bd897417f807f0f3b1a118c7f10a143625f241cdef705b10dac97f990393022997682983ef4ae438c69d05c531c7783", 0x34, 0x6}], 0x180080, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='system.posix_acl_default\x00', &(0x7f00000010c0)='!.--\\,%)\x00', 0x9, 0x1) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) 01:11:47 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000380)="847bf433436758ef32724b6b3dbb94568131504a51f97c2d82d3b27c7b553069bb4c61aa1b7f314356ec58f59c0f819d7195312bf0a34a331eb28228e4ac93b2985514879a4f5c1295f731f998ad08788afb26bbe70fd3914f6377b3e922e56346952d94a964289677b4c1d82c287f05daf1e4eb392ec1797b46866ab46bcf696c6437bf2876469ea3f47672005a3ed7c215e2491c0118442d4806a2366df6b41bd5431b9fe5a0672e0716f1e2", 0xad, 0xfffffffffffff476}], 0x8000, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 01:11:47 executing program 5: execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)='[', 0x1}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio}, {@jqfmt_vfsv1}, {@usrquota}], [{@dont_measure}]}) 01:11:47 executing program 7: lgetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='\x00']) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="84", 0x1, 0xfffffffffffff476}, {&(0x7f0000000440)="5b7ec96653a201f67deabce8bdf124fb3c754ce3e85915b190c74f5ece29073668c4b1a0c7852a39201c2a1cb45b8ad5fdc40ee5a70f2ac483", 0x39, 0x5}, {0x0}], 0x0, &(0x7f0000000700)={[{@grpjquota}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv1}, {@usrquota}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) open$dir(&(0x7f0000000800)='./file0\x00', 0x50200, 0x0) chmod(&(0x7f0000000840)='./file0\x00', 0x131) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000a40)=[&(0x7f00000008c0)='root', 0x0], 0x0) rmdir(&(0x7f0000000b80)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x688342, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000e40)='ext4\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x1, &(0x7f0000000f00)=[{&(0x7f0000000ec0)="41b7", 0x2}], 0x0, &(0x7f0000000f40)={[{@resuid}, {@prjquota}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '.\\}_]&'}}, {@fowner_eq}, {@context={'context', 0x3d, 'user_u'}}]}) mount_setattr(r0, &(0x7f0000000fc0)='./file0\x00', 0x800, &(0x7f0000001000)={0x100002, 0xfd, 0x80000}, 0x20) lsetxattr(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)=@random={'osx.', 'context'}, &(0x7f00000023c0)='grpjquota=', 0xa, 0x0) [ 2315.802545] loop5: detected capacity change from 0 to 16372 [ 2315.807552] ext2: Unknown parameter 'dont_measure' 01:11:47 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2041, 0x100) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x10000}, 0x4) [ 2315.861460] loop7: detected capacity change from 0 to 16372 [ 2315.863077] ext2: Unknown parameter 'subj_type' [ 2315.885472] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 2315.891923] loop1: detected capacity change from 0 to 16372 [ 2315.895150] loop3: detected capacity change from 0 to 16372 [ 2315.899376] ext2: Unknown parameter 'dont_measure' [ 2315.900533] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 2316.338795] ================================================================== [ 2316.339933] BUG: KASAN: use-after-free in __lock_acquire+0x42c5/0x5e70 [ 2316.340945] Read of size 8 at addr ffff88800d975cc8 by task syz-executor/46314 [ 2316.342047] [ 2316.342287] CPU: 1 PID: 46314 Comm: syz-executor Not tainted 5.19.0-rc5-next-20220707 #1 [ 2316.343318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2316.344752] Call Trace: [ 2316.345087] [ 2316.345384] dump_stack_lvl+0x8b/0xb3 [ 2316.345895] print_report.cold+0x5e/0x5e1 [ 2316.346444] ? __lock_acquire+0x42c5/0x5e70 [ 2316.347005] kasan_report+0xb1/0x1b0 [ 2316.347497] ? __lock_acquire+0x42c5/0x5e70 [ 2316.348060] __lock_acquire+0x42c5/0x5e70 [ 2316.348631] ? lock_chain_count+0x20/0x20 [ 2316.349173] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2316.349854] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2316.350563] ? finish_task_switch.isra.0+0x230/0x8a0 [ 2316.351251] lock_acquire+0x1a2/0x530 [ 2316.351776] ? kmemleak_scan+0x21d/0x16f0 [ 2316.352359] ? lock_release+0x750/0x750 [ 2316.352902] ? mark_held_locks+0x9e/0xe0 [ 2316.353467] ? call_rcu+0x585/0xa20 [ 2316.354242] ? call_rcu+0x585/0xa20 [ 2316.355453] ? _raw_spin_lock_irq+0x41/0x50 [ 2316.356301] _raw_spin_lock_irq+0x32/0x50 [ 2316.357067] ? kmemleak_scan+0x21d/0x16f0 [ 2316.357855] kmemleak_scan+0x21d/0x16f0 [ 2316.358615] ? paint_ptr+0xc0/0xc0 [ 2316.359306] ? strncpy_from_user+0x204/0x3d0 [ 2316.360163] kmemleak_write+0x56c/0x680 [ 2316.360930] ? kmemleak_scan+0x16f0/0x16f0 [ 2316.361662] ? debugfs_file_get+0x1ce/0x440 [ 2316.362345] ? debugfs_file_put+0xd0/0xd0 [ 2316.363008] full_proxy_write+0x11d/0x190 [ 2316.363665] ? full_proxy_poll+0x170/0x170 [ 2316.364356] vfs_write+0x264/0xac0 [ 2316.364946] ksys_write+0x127/0x250 [ 2316.365537] ? __ia32_sys_read+0xb0/0xb0 [ 2316.366164] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2316.366975] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2316.367793] do_syscall_64+0x3b/0x90 [ 2316.368382] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2316.369186] RIP: 0033:0x7f7687d185c3 [ 2316.369765] Code: 16 00 00 00 eb ae 90 b8 6e 00 00 00 eb a6 e8 44 ef 04 00 0f 1f 40 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 2316.372528] RSP: 002b:00007ffc58c9ef68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2316.373681] RAX: ffffffffffffffda RBX: 00007ffc58c9f5a8 RCX: 00007f7687d185c3 [ 2316.374792] RDX: 0000000000000004 RSI: 00007f7687dceed9 RDI: 0000000000000003 [ 2316.375887] RBP: 0000000000000003 R08: 000000000000090b R09: 00007ffc58dbe080 [ 2316.376985] R10: 00007ffc58dbe090 R11: 0000000000000246 R12: 00007f7687d1ab10 [ 2316.378053] R13: 00007ffc58c9fede R14: 0000000000000000 R15: 0000000000235613 [ 2316.379161] [ 2316.379506] [ 2316.379784] Allocated by task 46236: [ 2316.380354] kasan_save_stack+0x1e/0x40 [ 2316.380958] __kasan_slab_alloc+0x66/0x80 [ 2316.381588] kmem_cache_alloc+0x1b1/0x490 [ 2316.382226] __create_object.isra.0+0x3d/0xc10 [ 2316.382954] __kmalloc_track_caller+0x271/0x440 [ 2316.383680] kmemdup+0x23/0x50 [ 2316.384208] shmem_symlink+0x185/0x7f0 [ 2316.384804] vfs_symlink+0x360/0x5b0 [ 2316.385367] do_symlinkat+0x144/0x2a0 [ 2316.385971] __x64_sys_symlink+0x75/0x90 [ 2316.386600] do_syscall_64+0x3b/0x90 [ 2316.387196] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2316.387983] [ 2316.388259] Freed by task 46317: [ 2316.388770] kasan_save_stack+0x1e/0x40 [ 2316.389361] kasan_set_track+0x21/0x30 [ 2316.389961] kasan_set_free_info+0x20/0x30 [ 2316.390628] __kasan_slab_free+0x108/0x190 [ 2316.391298] kmem_cache_free+0xfb/0x600 [ 2316.391930] rcu_core+0x7e2/0x2080 [ 2316.392492] __do_softirq+0x1c8/0x8cc [ 2316.393089] [ 2316.393356] Last potentially related work creation: [ 2316.394088] kasan_save_stack+0x1e/0x40 [ 2316.394717] __kasan_record_aux_stack+0x97/0xa0 [ 2316.395453] call_rcu+0x6a/0xa20 [ 2316.395983] kfree+0xbb/0x5d0 [ 2316.396492] shmem_free_in_core_inode+0x8b/0xa0 [ 2316.397209] i_callback+0x42/0x70 [ 2316.397764] rcu_core+0x7e2/0x2080 [ 2316.398264] __do_softirq+0x1c8/0x8cc [ 2316.398823] [ 2316.399063] Second to last potentially related work creation: [ 2316.399886] kasan_save_stack+0x1e/0x40 [ 2316.400456] __kasan_record_aux_stack+0x97/0xa0 [ 2316.401122] call_rcu+0x6a/0xa20 [ 2316.401603] kmem_cache_free+0xc1/0x600 [ 2316.402162] __put_cred+0x12e/0x180 [ 2316.402704] revert_creds+0xaf/0xd0 [ 2316.403224] do_faccessat+0x2e7/0x810 [ 2316.403784] do_syscall_64+0x3b/0x90 [ 2316.404339] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2316.405063] [ 2316.405302] The buggy address belongs to the object at ffff88800d975cb0 [ 2316.405302] which belongs to the cache kmemleak_object of size 368 [ 2316.407053] The buggy address is located 24 bytes inside of [ 2316.407053] 368-byte region [ffff88800d975cb0, ffff88800d975e20) [ 2316.408623] [ 2316.408866] The buggy address belongs to the physical page: [ 2316.409596] page:0000000048bd1363 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd974 [ 2316.410828] head:0000000048bd1363 order:1 compound_mapcount:0 compound_pincount:0 [ 2316.411817] flags: 0x100000000010200(slab|head|node=0|zone=1) [ 2316.412596] raw: 0100000000010200 0000000000000000 dead000000000001 ffff88800784f780 [ 2316.413607] raw: 0000000000000000 0000000000120012 00000001ffffffff 0000000000000000 [ 2316.414605] page dumped because: kasan: bad access detected [ 2316.415343] [ 2316.415569] Memory state around the buggy address: [ 2316.416251] ffff88800d975b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2316.417205] ffff88800d975c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 2316.418197] >ffff88800d975c80: fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb fb [ 2316.419170] ^ [ 2316.419944] ffff88800d975d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2316.420949] ffff88800d975d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2316.421935] ================================================================== [ 2316.422917] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 01:11:48 Registers: info registers vcpu 0 RAX=ffff888037088001 RBX=ffff8880370873e0 RCX=0000000000000001 RDX=ffff888037087c01 RSI=ffff888037087c18 RDI=ffff8880370873f0 RBP=ffff888037087c18 RSP=ffff888037087328 R8 =ffffffff85cc74da R9 =ffffffff85cc74de R10=ffffed1006e10e89 R11=000000000003403b R12=0000000000000008 R13=ffff888037080000 R14=ffff8880370873e0 R15=ffffffff85cc74df RIP=ffffffff81115cfd RFL=00000283 [--S---C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8ba3c028c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055a24482b2b0 CR3=000000003be72000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 00ff00000000ff00 000000ff000000ff YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 ffffffffffff0000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000006561 6124242f6867632f YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 622f617461642f76 6564752f6e75722f YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000075 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8241e451 RDI=ffffffff873e6660 RBP=ffffffff873e6620 RSP=ffff88803c51f358 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000075 R11=0000000000000001 R12=0000000000000075 R13=ffffffff873e6620 R14=0000000000000010 R15=ffffffff8241e440 RIP=ffffffff8241e4a9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556d48400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f8ba32c6344 CR3=000000000ebca000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffff000000000000 ff00000000000000 YMM02=0000000000000000 0000000000000000 ffffff0f0e0d0c0b 0a09080706050403 YMM03=0000000000000000 0000000000000000 696e656420737365 636341002f737973 YMM04=0000000000000000 0000000000000000 5347415400333937 36393833323d4445 YMM05=0000000000000000 0000000000000000 3d524f4e494d0037 3d524f4a414d0038 YMM06=0000000000000000 0000000000000000 534b534944006b73 69643d4550595456 YMM07=0000000000000000 0000000000000000 414e564544006b63 6f6c623d4d455453 YMM08=0000000000000000 0000000000000000 49006d756e203c20 69000a313a56000a YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000