ormal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:00:33 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:00:33 executing program 4: syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:00:33 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) socket$inet_tcp(0x2, 0x1, 0x0) 16:00:33 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:00:33 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:00:33 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:00:33 executing program 0: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2701.497096] loop3: detected capacity change from 0 to 131072 [ 2701.512712] loop6: detected capacity change from 0 to 131072 16:00:33 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 2701.547903] loop1: detected capacity change from 0 to 131072 [ 2701.553115] loop0: detected capacity change from 0 to 131072 [ 2701.556136] loop5: detected capacity change from 0 to 131072 16:00:33 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2701.565211] msdos: Unknown parameter 'audit' 16:00:33 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:00:33 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) [ 2701.610680] loop3: detected capacity change from 0 to 131072 16:00:33 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:00:33 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:00:33 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2701.737513] loop3: detected capacity change from 0 to 131072 [ 2701.769768] loop6: detected capacity change from 0 to 131072 16:00:42 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:00:42 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:00:42 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:00:42 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:00:42 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c", 0x64, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:00:42 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:00:42 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) socket$inet_tcp(0x2, 0x1, 0x0) 16:00:42 executing program 0: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2710.802640] loop3: detected capacity change from 0 to 131072 [ 2710.814848] loop0: detected capacity change from 0 to 131072 16:00:42 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2710.854693] loop5: detected capacity change from 0 to 131072 [ 2710.865886] loop6: detected capacity change from 0 to 131072 [ 2710.867332] loop1: detected capacity change from 0 to 131072 [ 2710.868401] msdos: Unknown parameter 'audit' [ 2710.876742] msdos: Unknown parameter 'audit' 16:00:42 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:00:42 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:00:42 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:00:42 executing program 2: delete_module(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 16:00:42 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:00:42 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c", 0x64, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2710.992298] loop0: detected capacity change from 0 to 131072 16:00:42 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:00:42 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:00:42 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:00:42 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2711.096095] loop5: detected capacity change from 0 to 131072 [ 2711.101647] loop3: detected capacity change from 0 to 131072 [ 2711.105161] msdos: Unknown parameter 'audit' 16:00:42 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2711.127139] loop1: detected capacity change from 0 to 131072 16:00:42 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) [ 2711.173106] loop6: detected capacity change from 0 to 131072 [ 2711.209571] loop0: detected capacity change from 0 to 131072 16:00:51 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:00:51 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:00:51 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:00:51 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c", 0x64, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:00:51 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:00:51 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) 16:00:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:00:51 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:00:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) syz_open_dev$vcsn(0x0, 0x1ff, 0x10001) [ 2719.574546] loop3: detected capacity change from 0 to 131072 [ 2719.582381] loop0: detected capacity change from 0 to 131072 16:00:51 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2719.594248] loop6: detected capacity change from 0 to 131072 [ 2719.597440] loop1: detected capacity change from 0 to 131072 [ 2719.605913] loop5: detected capacity change from 0 to 131072 [ 2719.613965] msdos: Unknown parameter 'audit' 16:00:51 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:00:51 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:00:51 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x10001) 16:00:51 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c", 0x64, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2719.732726] loop6: detected capacity change from 0 to 131072 [ 2719.734155] msdos: Unknown parameter 'audit' [ 2719.766516] loop1: detected capacity change from 0 to 131072 [ 2719.785023] loop5: detected capacity change from 0 to 131072 [ 2719.788885] msdos: Unknown parameter 'audit' 16:01:00 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:00 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:00 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:00 executing program 2: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:00 executing program 4: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 16:01:00 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:00 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:00 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2729.030561] loop3: detected capacity change from 0 to 131072 [ 2729.032841] loop0: detected capacity change from 0 to 131072 [ 2729.037543] loop5: detected capacity change from 0 to 131072 16:01:00 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:00 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2729.068860] msdos: Unknown parameter 'audit' [ 2729.083098] loop6: detected capacity change from 0 to 131072 16:01:00 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2729.150968] loop0: detected capacity change from 0 to 131072 16:01:00 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:00 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:00 executing program 2: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:00 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) [ 2729.194960] loop3: detected capacity change from 0 to 131072 [ 2729.253793] loop5: detected capacity change from 0 to 131072 [ 2729.258825] loop6: detected capacity change from 0 to 131072 16:01:10 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:10 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:10 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:10 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:10 executing program 2: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:10 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:10 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:10 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2738.863380] loop0: detected capacity change from 0 to 131072 [ 2738.879074] loop3: detected capacity change from 0 to 131072 16:01:10 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2738.899852] loop5: detected capacity change from 0 to 131072 16:01:10 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2738.919544] loop6: detected capacity change from 0 to 131072 [ 2738.941066] loop4: detected capacity change from 0 to 131072 [ 2738.962567] loop0: detected capacity change from 0 to 131072 16:01:10 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:10 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:10 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:10 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:10 executing program 2: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2739.034067] loop6: detected capacity change from 0 to 131072 16:01:10 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2739.064454] loop0: detected capacity change from 0 to 131072 [ 2739.079566] loop3: detected capacity change from 0 to 131072 [ 2739.136795] loop5: detected capacity change from 0 to 131072 16:01:19 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:19 executing program 2: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 16:01:19 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:19 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:19 executing program 4: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:19 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:19 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:19 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2747.644321] loop3: detected capacity change from 0 to 131072 16:01:19 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2747.689773] loop0: detected capacity change from 0 to 131072 16:01:19 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2747.707600] loop5: detected capacity change from 0 to 131072 16:01:19 executing program 2: syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) [ 2747.720089] loop6: detected capacity change from 0 to 131072 16:01:19 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2747.770874] loop3: detected capacity change from 0 to 131072 16:01:19 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:19 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2747.824827] loop0: detected capacity change from 0 to 131072 16:01:19 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:19 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:01:19 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:19 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:19 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2747.904618] loop6: detected capacity change from 0 to 131072 [ 2747.908339] loop3: detected capacity change from 0 to 131072 [ 2747.908678] loop5: detected capacity change from 0 to 131072 [ 2747.939970] loop0: detected capacity change from 0 to 131072 [ 2747.977906] loop4: detected capacity change from 0 to 131072 [ 2747.983832] msdos: Unknown parameter 'audit' 16:01:27 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:27 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:27 executing program 2: syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 16:01:27 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:27 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:27 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:27 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:27 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2756.127060] loop3: detected capacity change from 0 to 131072 [ 2756.129689] loop0: detected capacity change from 0 to 131072 16:01:27 executing program 1: r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2756.164827] loop4: detected capacity change from 0 to 131072 16:01:27 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:27 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2756.191865] loop6: detected capacity change from 0 to 131072 16:01:27 executing program 2: syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) [ 2756.231505] loop0: detected capacity change from 0 to 131072 [ 2756.232696] loop3: detected capacity change from 0 to 131072 16:01:27 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:36 executing program 2: syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 16:01:36 executing program 1: r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:36 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) 16:01:36 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:36 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:36 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:01:36 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:36 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2764.939315] loop6: detected capacity change from 0 to 131072 [ 2764.948976] loop3: detected capacity change from 0 to 131072 [ 2764.956125] loop4: detected capacity change from 0 to 131072 [ 2764.963311] msdos: Unknown parameter 'audit' 16:01:36 executing program 2: syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 16:01:36 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) 16:01:36 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:36 executing program 6: delete_module(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:36 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:01:36 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:36 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:36 executing program 1: r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2765.072618] loop3: detected capacity change from 0 to 131072 16:01:36 executing program 2: syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) [ 2765.097096] loop4: detected capacity change from 0 to 131072 [ 2765.103589] msdos: Unknown parameter 'audit' [ 2765.105077] loop5: detected capacity change from 0 to 131072 16:01:36 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:36 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) [ 2765.176791] loop6: detected capacity change from 0 to 131072 [ 2765.190725] loop3: detected capacity change from 0 to 131072 16:01:44 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:44 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:44 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:44 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) 16:01:44 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:44 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:01:44 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) 16:01:44 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2773.141979] loop3: detected capacity change from 0 to 131072 [ 2773.149108] loop4: detected capacity change from 0 to 131072 [ 2773.153832] msdos: Unknown parameter 'audit' [ 2773.190543] loop2: detected capacity change from 0 to 131072 16:01:44 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2773.199952] msdos: Unknown parameter 'audit' 16:01:44 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) 16:01:44 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:44 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:44 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:01:45 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:45 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]}) [ 2773.269079] loop0: detected capacity change from 0 to 131072 [ 2773.300306] loop4: detected capacity change from 0 to 131072 [ 2773.305387] msdos: Unknown parameter 'audit' 16:01:53 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:01:53 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:53 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) 16:01:53 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:53 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0) 16:01:53 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:53 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:53 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2782.186217] loop4: detected capacity change from 0 to 131072 [ 2782.191475] loop0: detected capacity change from 0 to 131072 [ 2782.192921] msdos: Unknown parameter 'audit' [ 2782.196878] loop3: detected capacity change from 0 to 131072 16:01:53 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0) [ 2782.228904] loop2: detected capacity change from 0 to 131072 16:01:53 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:53 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2782.249835] msdos: Unknown parameter 'audit' 16:01:54 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:54 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) 16:01:54 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:01:54 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:01:54 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2782.319916] loop0: detected capacity change from 0 to 131072 [ 2782.320333] loop3: detected capacity change from 0 to 131072 [ 2782.328949] loop4: detected capacity change from 0 to 131072 [ 2782.336278] msdos: Unknown parameter 'audit' 16:01:54 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2782.346806] loop6: detected capacity change from 0 to 131072 [ 2782.398891] loop2: detected capacity change from 0 to 131072 [ 2782.401614] msdos: Unknown parameter 'audit' 16:02:02 executing program 1: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0) 16:02:02 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0) 16:02:02 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:02 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) 16:02:02 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:02 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) 16:02:02 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:02 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2791.185640] loop6: detected capacity change from 0 to 131072 [ 2791.190066] loop3: detected capacity change from 0 to 131072 [ 2791.209918] loop2: detected capacity change from 0 to 131072 [ 2791.216368] loop0: detected capacity change from 0 to 131072 [ 2791.217890] loop4: detected capacity change from 0 to 131072 [ 2791.222136] msdos: Unknown parameter 'audit' [ 2791.239551] msdos: Unknown parameter 'audit' 16:02:03 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) [ 2791.300129] loop3: detected capacity change from 0 to 131072 16:02:12 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) 16:02:12 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:12 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:02:12 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@appraise}]}) [ 2800.749684] loop0: detected capacity change from 0 to 131072 16:02:12 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}], [{@audit}, {@appraise}]}) [ 2800.782520] loop6: detected capacity change from 0 to 131072 [ 2800.806693] loop2: detected capacity change from 0 to 131072 [ 2800.809116] loop1: detected capacity change from 0 to 131072 [ 2800.814468] loop3: detected capacity change from 0 to 131072 [ 2800.819565] msdos: Unknown parameter 'audit' [ 2800.825555] loop4: detected capacity change from 0 to 131072 [ 2800.838420] msdos: Unknown parameter 'audit' [ 2800.843926] loop0: detected capacity change from 0 to 131072 16:02:12 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:12 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:02:12 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) 16:02:12 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2800.934138] loop6: detected capacity change from 0 to 131072 [ 2800.974359] loop0: detected capacity change from 0 to 131072 16:02:12 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:12 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}], [{@audit}, {@appraise}]}) 16:02:12 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2801.010521] loop3: detected capacity change from 0 to 131072 [ 2801.023950] loop2: detected capacity change from 0 to 131072 [ 2801.033233] msdos: Unknown parameter 'audit' 16:02:12 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2801.052419] loop1: detected capacity change from 0 to 131072 [ 2801.060997] loop6: detected capacity change from 0 to 131072 [ 2801.079076] loop4: detected capacity change from 0 to 131072 [ 2801.087705] loop0: detected capacity change from 0 to 131072 16:02:12 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:12 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2801.113564] msdos: Unknown parameter 'audit' 16:02:12 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2801.161949] loop6: detected capacity change from 0 to 131072 [ 2801.219729] loop3: detected capacity change from 0 to 131072 16:02:23 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:23 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:23 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) 16:02:23 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:23 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}], [{@audit}, {@appraise}]}) 16:02:23 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:23 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:23 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2811.298805] loop2: detected capacity change from 0 to 131072 [ 2811.303467] msdos: Unknown parameter 'audit' 16:02:23 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2811.325505] loop3: detected capacity change from 0 to 131072 [ 2811.342627] loop0: detected capacity change from 0 to 131072 [ 2811.344923] loop6: detected capacity change from 0 to 131072 [ 2811.345708] loop2: detected capacity change from 0 to 131072 [ 2811.353472] msdos: Unknown parameter 'audit' [ 2811.362431] loop4: detected capacity change from 0 to 131072 [ 2811.369862] loop1: detected capacity change from 0 to 131072 [ 2811.387570] msdos: Unknown parameter 'audit' 16:02:23 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:23 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:23 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:23 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:23 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}], [{@audit}, {@appraise}]}) [ 2811.536510] loop0: detected capacity change from 0 to 131072 [ 2811.561352] loop3: detected capacity change from 0 to 131072 [ 2811.566722] loop2: detected capacity change from 0 to 131072 [ 2811.574586] msdos: Unknown parameter 'audit' 16:02:32 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:32 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:32 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e", 0x66, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:32 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:32 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:02:32 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@appraise}]}) 16:02:32 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:33 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2821.274504] loop3: detected capacity change from 0 to 131072 [ 2821.276022] loop2: detected capacity change from 0 to 131072 [ 2821.277294] loop1: detected capacity change from 0 to 131072 [ 2821.283276] msdos: Unknown parameter 'audit' [ 2821.318783] loop0: detected capacity change from 0 to 131072 [ 2821.319612] loop4: detected capacity change from 0 to 131072 [ 2821.320959] loop6: detected capacity change from 0 to 131072 [ 2821.327742] msdos: Unknown parameter 'audit' 16:02:33 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:33 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:33 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:33 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:33 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:33 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:33 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}]}) [ 2821.419371] loop2: detected capacity change from 0 to 131072 [ 2821.422921] msdos: Unknown parameter 'audit' 16:02:33 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2821.439083] loop1: detected capacity change from 0 to 131072 16:02:33 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:33 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:33 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2821.525554] loop2: detected capacity change from 0 to 131072 [ 2821.533111] msdos: Unknown parameter 'audit' [ 2821.554588] loop0: detected capacity change from 0 to 131072 [ 2821.555336] loop1: detected capacity change from 0 to 131072 [ 2821.555970] loop4: detected capacity change from 0 to 131072 [ 2821.557455] loop6: detected capacity change from 0 to 131072 [ 2821.563005] msdos: Unknown parameter 'audit' 16:02:42 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:42 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:42 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:42 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:42 executing program 5: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)) 16:02:42 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:42 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:42 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2831.262062] loop2: detected capacity change from 0 to 131072 [ 2831.265351] msdos: Unknown parameter 'audit' 16:02:43 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2831.313399] loop1: detected capacity change from 0 to 131072 [ 2831.323694] loop4: detected capacity change from 0 to 131072 [ 2831.329302] msdos: Unknown parameter 'audit' [ 2831.332024] loop0: detected capacity change from 0 to 131072 [ 2831.333509] loop6: detected capacity change from 0 to 131072 [ 2831.346380] loop3: detected capacity change from 0 to 131072 16:02:51 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:02:51 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2839.823860] loop1: detected capacity change from 0 to 131072 [ 2839.827000] loop2: detected capacity change from 0 to 131072 [ 2839.829954] msdos: Unknown parameter 'audit' [ 2839.833713] loop5: detected capacity change from 0 to 131072 [ 2839.837557] loop4: detected capacity change from 0 to 131072 [ 2839.841573] msdos: Unknown parameter 'audit' [ 2839.857928] loop3: detected capacity change from 0 to 131072 [ 2839.861462] loop0: detected capacity change from 0 to 131072 16:02:51 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2839.945634] loop5: detected capacity change from 0 to 131072 [ 2839.949087] loop2: detected capacity change from 0 to 131072 16:02:51 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2839.956685] msdos: Unknown parameter 'audit' [ 2839.962817] loop1: detected capacity change from 0 to 131072 [ 2839.982221] loop4: detected capacity change from 0 to 131072 16:02:51 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52", 0x33, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2840.008548] msdos: Unknown parameter 'audit' 16:02:51 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2840.061733] loop5: detected capacity change from 0 to 131072 [ 2840.072748] loop0: detected capacity change from 0 to 131072 16:02:51 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:02:51 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2840.090825] loop2: detected capacity change from 0 to 131072 [ 2840.099359] msdos: Unknown parameter 'audit' [ 2840.117529] loop4: detected capacity change from 0 to 131072 16:03:01 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:03:01 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2849.771454] loop2: detected capacity change from 0 to 131072 [ 2849.772364] loop1: detected capacity change from 0 to 131072 [ 2849.776462] msdos: Unknown parameter 'audit' [ 2849.778039] loop0: detected capacity change from 0 to 131072 [ 2849.786042] loop4: detected capacity change from 0 to 131072 [ 2849.787690] loop3: detected capacity change from 0 to 131072 16:03:01 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:03:01 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2849.884822] loop2: detected capacity change from 0 to 131072 [ 2849.886825] loop1: detected capacity change from 0 to 131072 [ 2849.887673] msdos: Unknown parameter 'audit' [ 2849.898686] loop6: detected capacity change from 0 to 131072 16:03:01 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:01 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2849.986390] loop0: detected capacity change from 0 to 131072 [ 2850.006358] loop4: detected capacity change from 0 to 131072 16:03:11 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 1: delete_module(0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:03:11 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:03:11 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2859.731130] loop0: detected capacity change from 0 to 131072 [ 2859.737066] loop1: detected capacity change from 0 to 131072 [ 2859.746325] loop2: detected capacity change from 0 to 131072 [ 2859.754140] msdos: Unknown parameter 'audit' [ 2859.754714] loop4: detected capacity change from 0 to 131072 [ 2859.766225] loop3: detected capacity change from 0 to 131072 16:03:11 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d424", 0x1a, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:03:11 executing program 1: delete_module(0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2859.900064] loop1: detected capacity change from 0 to 131072 [ 2859.900139] loop0: detected capacity change from 0 to 131072 [ 2859.924618] loop2: detected capacity change from 0 to 131072 [ 2859.929529] msdos: Unknown parameter 'audit' [ 2859.964982] loop4: detected capacity change from 0 to 131072 16:03:11 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2860.005061] loop3: detected capacity change from 0 to 131072 [ 2860.007769] loop1: detected capacity change from 0 to 131072 [ 2860.060952] loop2: detected capacity change from 0 to 131072 [ 2860.066514] msdos: Unknown parameter 'audit' 16:03:11 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:11 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:03:20 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6", 0x1, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2868.911610] loop2: detected capacity change from 0 to 131072 [ 2868.918698] loop1: detected capacity change from 0 to 131072 [ 2868.922989] msdos: Unknown parameter 'audit' [ 2868.945331] loop6: detected capacity change from 0 to 131072 [ 2868.949579] loop0: detected capacity change from 0 to 131072 [ 2868.972381] loop3: detected capacity change from 0 to 131072 [ 2868.991770] loop5: detected capacity change from 0 to 131072 [ 2869.010633] msdos: Unknown parameter 'audit' 16:03:20 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:20 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2869.117579] loop1: detected capacity change from 0 to 131072 [ 2869.159460] loop2: detected capacity change from 0 to 131072 [ 2869.173666] msdos: Unknown parameter 'audit' 16:03:28 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:03:28 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:28 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:28 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36", 0x30, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:03:28 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:28 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:03:28 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:28 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2876.282360] loop0: detected capacity change from 0 to 131072 16:03:28 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:28 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2876.332521] loop2: detected capacity change from 0 to 131072 [ 2876.341437] loop6: detected capacity change from 0 to 131072 [ 2876.352382] msdos: Unknown parameter 'audit' [ 2876.375010] loop5: detected capacity change from 0 to 131072 [ 2876.380286] loop3: detected capacity change from 0 to 131072 [ 2876.400132] msdos: Unknown parameter 'audit' [ 2876.401789] msdos: Unknown parameter 'audit' 16:03:28 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:28 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:28 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:28 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2876.470000] loop2: detected capacity change from 0 to 131072 [ 2876.477675] msdos: Unknown parameter 'audit' 16:03:28 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2876.504146] loop4: detected capacity change from 0 to 131072 16:03:28 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2876.567573] loop6: detected capacity change from 0 to 131072 [ 2876.606915] loop3: detected capacity change from 0 to 131072 16:03:36 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:03:36 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:03:37 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) 16:03:37 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2885.294054] loop6: detected capacity change from 0 to 131072 [ 2885.296683] loop0: detected capacity change from 0 to 131072 [ 2885.298013] loop1: detected capacity change from 0 to 131072 [ 2885.307865] loop4: detected capacity change from 0 to 131072 [ 2885.316080] loop2: detected capacity change from 0 to 131072 [ 2885.322358] loop5: detected capacity change from 0 to 131072 [ 2885.324775] loop3: detected capacity change from 0 to 131072 [ 2885.333458] msdos: Unknown parameter 'audit' [ 2885.337511] msdos: Unknown parameter 'audit' 16:03:37 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2885.445031] loop1: detected capacity change from 0 to 131072 [ 2885.451383] loop0: detected capacity change from 0 to 131072 16:03:37 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e", 0xe2, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:03:37 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2885.475023] loop6: detected capacity change from 0 to 131072 16:03:37 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:03:37 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2885.546125] loop2: detected capacity change from 0 to 131072 [ 2885.554630] msdos: Unknown parameter 'audit' 16:03:37 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:37 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1}) [ 2885.588920] loop3: detected capacity change from 0 to 131072 [ 2885.604419] loop5: detected capacity change from 0 to 131072 [ 2885.608813] loop1: detected capacity change from 0 to 131072 [ 2885.650788] loop6: detected capacity change from 0 to 131072 16:03:44 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:44 executing program 3: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d9414", 0xc7, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:03:44 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:44 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:03:44 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:44 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:44 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, 0x0) 16:03:44 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2892.922220] loop6: detected capacity change from 0 to 131072 [ 2892.930856] loop2: detected capacity change from 0 to 131072 [ 2892.932778] loop5: detected capacity change from 0 to 131072 [ 2892.946438] msdos: Unknown parameter 'audit' [ 2892.948502] msdos: Unknown parameter 'audit' 16:03:44 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2892.975214] loop1: detected capacity change from 0 to 131072 [ 2892.977620] loop3: detected capacity change from 0 to 131072 [ 2892.979074] msdos: Unknown parameter 'audit' 16:03:44 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:44 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, 0x0) [ 2893.020816] loop6: detected capacity change from 0 to 131072 16:03:44 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:44 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2893.140046] loop2: detected capacity change from 0 to 131072 [ 2893.143955] msdos: Unknown parameter 'audit' 16:03:53 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, 0x0) 16:03:53 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 5: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49", 0xdc, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2902.058452] loop0: detected capacity change from 0 to 131072 [ 2902.061035] loop1: detected capacity change from 0 to 131072 [ 2902.073996] loop2: detected capacity change from 0 to 131072 [ 2902.082632] loop6: detected capacity change from 0 to 131072 [ 2902.086875] loop3: detected capacity change from 0 to 131072 [ 2902.088871] msdos: Unknown parameter 'audit' [ 2902.092206] loop5: detected capacity change from 0 to 131072 16:03:53 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x10, 0x1}) 16:03:53 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2902.160753] loop0: detected capacity change from 0 to 131072 [ 2902.163119] loop1: detected capacity change from 0 to 131072 16:03:53 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:53 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2902.271055] loop6: detected capacity change from 0 to 131072 16:03:54 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x10, 0x1}) 16:03:54 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:54 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:54 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2902.314576] loop2: detected capacity change from 0 to 131072 [ 2902.319555] loop1: detected capacity change from 0 to 131072 [ 2902.323116] msdos: Unknown parameter 'audit' 16:03:54 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:03:54 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0) [ 2902.343627] loop0: detected capacity change from 0 to 131072 [ 2902.344726] loop3: detected capacity change from 0 to 131072 [ 2902.366408] loop5: detected capacity change from 0 to 131072 16:03:54 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2902.375466] loop6: detected capacity change from 0 to 131072 16:03:54 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x10, 0x1}) [ 2902.419061] loop1: detected capacity change from 0 to 131072 16:04:03 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x0, 0x1}) 16:04:03 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:04:03 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:03 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0) 16:04:03 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:03 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:04:03 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:03 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2911.602998] loop2: detected capacity change from 0 to 131072 [ 2911.606667] msdos: Unknown parameter 'audit' [ 2911.608749] loop3: detected capacity change from 0 to 131072 [ 2911.612953] msdos: Unknown parameter 'audit' [ 2911.638376] loop0: detected capacity change from 0 to 131072 [ 2911.650377] loop5: detected capacity change from 0 to 131072 16:04:03 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2911.660915] loop1: detected capacity change from 0 to 131072 [ 2911.664769] loop6: detected capacity change from 0 to 131072 16:04:03 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031", 0x72, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2911.715090] loop2: detected capacity change from 0 to 131072 [ 2911.723078] loop3: detected capacity change from 0 to 131072 16:04:03 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x0, 0x1}) [ 2911.725335] msdos: Unknown parameter 'audit' 16:04:14 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:04:14 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x0, 0x1}) 16:04:14 executing program 3: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:04:14 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0) 16:04:14 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2922.863664] loop1: detected capacity change from 0 to 131072 [ 2922.868109] loop0: detected capacity change from 0 to 131072 [ 2922.881525] loop5: detected capacity change from 0 to 131072 [ 2922.883377] loop3: detected capacity change from 0 to 131072 [ 2922.892625] msdos: Unknown parameter 'audit' [ 2922.899493] loop6: detected capacity change from 0 to 131072 [ 2922.904878] loop2: detected capacity change from 0 to 131072 16:04:14 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e", 0x66, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:14 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10}) 16:04:14 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2923.084732] loop0: detected capacity change from 0 to 131072 [ 2923.111415] loop1: detected capacity change from 0 to 131072 [ 2923.111571] loop5: detected capacity change from 0 to 131072 [ 2923.119098] loop6: detected capacity change from 0 to 131072 [ 2923.138236] loop3: detected capacity change from 0 to 131072 [ 2923.139960] loop2: detected capacity change from 0 to 131072 16:04:25 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10}) 16:04:25 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:04:25 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) [ 2933.323873] loop0: detected capacity change from 0 to 131072 [ 2933.330580] loop3: detected capacity change from 0 to 131072 [ 2933.353102] loop2: detected capacity change from 0 to 131072 [ 2933.355086] loop6: detected capacity change from 0 to 131072 [ 2933.355855] loop1: detected capacity change from 0 to 131072 16:04:25 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 16:04:25 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:25 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:04:25 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2933.545463] loop0: detected capacity change from 0 to 131072 [ 2933.556064] loop6: detected capacity change from 0 to 131072 16:04:25 executing program 7: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10}) [ 2933.595312] loop2: detected capacity change from 0 to 131072 [ 2933.635792] loop3: detected capacity change from 0 to 131072 16:04:25 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) 16:04:25 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2933.646010] loop1: detected capacity change from 0 to 131072 [ 2933.756719] loop6: detected capacity change from 0 to 131072 16:04:35 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:35 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:35 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:35 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:35 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 16:04:35 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:04:35 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:35 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)='Ku', 0x2, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2943.360804] loop0: detected capacity change from 0 to 131072 [ 2943.387280] loop7: detected capacity change from 0 to 131072 [ 2943.404863] loop1: detected capacity change from 0 to 131072 [ 2943.421949] loop3: detected capacity change from 0 to 131072 [ 2943.424746] loop6: detected capacity change from 0 to 131072 [ 2943.434848] msdos: Unknown parameter 'audit' 16:04:35 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 16:04:35 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2943.464242] loop2: detected capacity change from 0 to 131072 [ 2943.568815] loop0: detected capacity change from 0 to 131072 16:04:45 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:45 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:04:45 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:45 executing program 5: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) 16:04:45 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:45 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:45 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:04:45 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52", 0x33, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2953.482928] loop7: detected capacity change from 0 to 131072 [ 2953.515093] loop0: detected capacity change from 0 to 131072 [ 2953.543716] loop1: detected capacity change from 0 to 131072 [ 2953.547296] loop3: detected capacity change from 0 to 131072 [ 2953.549763] loop6: detected capacity change from 0 to 131072 16:04:45 executing program 7: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565", 0xc, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:04:45 executing program 5: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) 16:04:45 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:45 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 2953.703955] loop7: detected capacity change from 0 to 131072 [ 2953.707051] msdos: Unknown parameter 'audit' 16:04:45 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:45 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) 16:04:45 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:45 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:45 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:04:45 executing program 5: syz_open_dev$vcsn(0x0, 0x5f, 0x800) [ 2953.833697] loop1: detected capacity change from 0 to 131072 [ 2953.864524] loop3: detected capacity change from 0 to 131072 [ 2953.871918] loop6: detected capacity change from 0 to 131072 [ 2953.911739] loop7: detected capacity change from 0 to 128 16:04:54 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:54 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}]}) 16:04:54 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565", 0xc, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:04:54 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:04:54 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:54 executing program 5: syz_open_dev$vcsn(0x0, 0x5f, 0x800) 16:04:54 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:54 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2962.805862] loop6: detected capacity change from 0 to 131072 [ 2962.810120] loop1: detected capacity change from 0 to 131072 [ 2962.820579] loop3: detected capacity change from 0 to 131072 [ 2962.820684] loop7: detected capacity change from 0 to 131072 16:04:54 executing program 5: syz_open_dev$vcsn(0x0, 0x5f, 0x800) 16:04:54 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:54 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:54 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:54 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:04:54 executing program 3: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:04:54 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}]}) 16:04:54 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2963.009127] loop6: detected capacity change from 0 to 131072 [ 2963.032909] loop2: detected capacity change from 0 to 131072 [ 2963.052132] loop1: detected capacity change from 0 to 131072 [ 2963.078815] loop7: detected capacity change from 0 to 131072 16:04:54 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2963.093051] loop3: detected capacity change from 0 to 131072 [ 2963.106803] msdos: Unknown parameter 'audit' 16:04:54 executing program 5: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) [ 2963.220597] loop0: detected capacity change from 0 to 131072 16:05:03 executing program 5: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) 16:05:03 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:03 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:03 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d424", 0x1a, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:03 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:03 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}]}) 16:05:03 executing program 3: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:03 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2971.595821] loop2: detected capacity change from 0 to 131072 [ 2971.608387] loop1: detected capacity change from 0 to 131072 16:05:03 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 2971.639700] loop0: detected capacity change from 0 to 131072 [ 2971.649957] loop3: detected capacity change from 0 to 131072 [ 2971.650032] loop7: detected capacity change from 0 to 131072 [ 2971.652130] loop6: detected capacity change from 0 to 131072 16:05:03 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:03 executing program 5: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) 16:05:03 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:03 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}]}) [ 2971.776809] loop6: detected capacity change from 0 to 131072 16:05:12 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, 0x0) 16:05:12 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)) 16:05:12 executing program 7: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) 16:05:12 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:12 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6", 0x1, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:12 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:12 executing program 5: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) 16:05:12 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2981.221717] loop0: detected capacity change from 0 to 131072 [ 2981.263451] loop1: detected capacity change from 0 to 131072 [ 2981.267752] loop6: detected capacity change from 0 to 131072 [ 2981.282590] loop3: detected capacity change from 0 to 131072 16:05:13 executing program 7: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) 16:05:13 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2981.428426] loop0: detected capacity change from 0 to 131072 16:05:13 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:13 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2981.463620] loop1: detected capacity change from 0 to 131072 16:05:13 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, 0x0) 16:05:13 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:13 executing program 7: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) [ 2981.508070] loop6: detected capacity change from 0 to 131072 16:05:13 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:13 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2981.551126] loop3: detected capacity change from 0 to 131072 16:05:13 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:05:13 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2981.606450] loop0: detected capacity change from 0 to 131072 [ 2981.609726] loop1: detected capacity change from 0 to 131072 [ 2981.658764] loop5: detected capacity change from 0 to 131072 [ 2981.677472] msdos: Unknown parameter 'audit' 16:05:22 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0) 16:05:22 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, 0x0) 16:05:22 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:05:22 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:05:22 executing program 7: syz_open_dev$vcsn(0x0, 0x0, 0x800) 16:05:22 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:22 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:22 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2990.427583] loop5: detected capacity change from 0 to 131072 [ 2990.432292] loop3: detected capacity change from 0 to 131072 [ 2990.438604] loop0: detected capacity change from 0 to 131072 [ 2990.469718] loop4: detected capacity change from 0 to 131072 [ 2990.470920] loop1: detected capacity change from 0 to 131072 [ 2990.471395] loop6: detected capacity change from 0 to 131072 16:05:22 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0) 16:05:22 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2990.486730] FAT-fs (loop4): bogus number of reserved sectors [ 2990.487674] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2990.534630] loop5: detected capacity change from 0 to 131072 16:05:22 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2990.540098] msdos: Unknown parameter 'audit' 16:05:22 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:22 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:22 executing program 7: syz_open_dev$vcsn(0x0, 0x0, 0x800) 16:05:22 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 2990.610788] loop0: detected capacity change from 0 to 131072 [ 2990.650086] loop6: detected capacity change from 0 to 131072 [ 2990.650667] loop1: detected capacity change from 0 to 131072 16:05:31 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:05:31 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 7: syz_open_dev$vcsn(0x0, 0x0, 0x800) 16:05:31 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:05:31 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 2999.915031] loop0: detected capacity change from 0 to 131072 [ 2999.917102] loop4: detected capacity change from 0 to 131072 [ 2999.926926] loop6: detected capacity change from 0 to 131072 [ 2999.942937] FAT-fs (loop4): bogus number of reserved sectors [ 2999.944255] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2999.959873] loop5: detected capacity change from 0 to 131072 [ 2999.971813] loop2: detected capacity change from 0 to 131072 [ 2999.975046] msdos: Unknown parameter 'audit' 16:05:31 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 7: syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) 16:05:31 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3000.114106] loop0: detected capacity change from 0 to 131072 [ 3000.133708] loop6: detected capacity change from 0 to 131072 16:05:31 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:05:31 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:31 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3000.194906] loop4: detected capacity change from 0 to 131072 16:05:31 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e", 0x19, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3000.219034] FAT-fs (loop4): bogus number of reserved sectors [ 3000.220198] FAT-fs (loop4): Can't find a valid FAT filesystem 16:05:31 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3000.266968] loop2: detected capacity change from 0 to 131072 [ 3000.270632] loop5: detected capacity change from 0 to 131072 [ 3000.278497] loop3: detected capacity change from 0 to 131072 [ 3000.307939] loop0: detected capacity change from 0 to 131072 [ 3000.345085] loop6: detected capacity change from 0 to 131072 16:05:40 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:40 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:05:40 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654", 0xc9, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:05:40 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:40 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:40 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:40 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:05:40 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3009.018084] loop1: detected capacity change from 0 to 131072 [ 3009.023138] loop0: detected capacity change from 0 to 131072 [ 3009.023321] loop5: detected capacity change from 0 to 131072 [ 3009.027247] loop2: detected capacity change from 0 to 131072 [ 3009.047323] loop4: detected capacity change from 0 to 131072 [ 3009.053628] loop3: detected capacity change from 0 to 131072 [ 3009.056541] loop6: detected capacity change from 0 to 131072 16:05:40 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3009.081874] loop7: detected capacity change from 0 to 131072 [ 3009.089769] msdos: Unknown parameter 'audit' [ 3009.150912] loop1: detected capacity change from 0 to 131072 16:05:50 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:50 executing program 5: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130", 0xc6, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:05:50 executing program 7: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:50 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:50 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:05:50 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:50 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:50 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3018.337562] loop7: detected capacity change from 0 to 131072 [ 3018.339342] loop6: detected capacity change from 0 to 131072 [ 3018.380023] loop3: detected capacity change from 0 to 131072 [ 3018.396224] loop4: detected capacity change from 0 to 131072 [ 3018.396513] loop2: detected capacity change from 0 to 131072 [ 3018.399683] loop0: detected capacity change from 0 to 131072 [ 3018.405336] loop5: detected capacity change from 0 to 131072 [ 3018.406343] loop1: detected capacity change from 0 to 131072 16:05:50 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:50 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6e", 0xc0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:05:50 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:50 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:50 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3018.529412] loop6: detected capacity change from 0 to 131072 16:05:50 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:05:50 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:05:50 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654", 0xc9, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3018.605262] loop3: detected capacity change from 0 to 131072 16:05:50 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3018.648134] loop1: detected capacity change from 0 to 131072 16:05:50 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654", 0xc9, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3018.656383] loop4: detected capacity change from 0 to 131072 [ 3018.669989] loop2: detected capacity change from 0 to 131072 16:05:50 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3018.693913] loop0: detected capacity change from 0 to 131072 [ 3018.714652] loop5: detected capacity change from 0 to 131072 [ 3018.731295] msdos: Unknown parameter 'audit' [ 3018.738655] loop6: detected capacity change from 0 to 131072 16:05:50 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd6", 0xb3, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:05:50 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3018.808313] loop3: detected capacity change from 0 to 131072 [ 3018.882872] loop0: detected capacity change from 0 to 131072 [ 3018.901142] loop2: detected capacity change from 0 to 131072 16:05:59 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:05:59 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:59 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:05:59 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:59 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:05:59 executing program 7: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0) 16:05:59 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654", 0xc9, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:05:59 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3028.154753] loop5: detected capacity change from 0 to 131072 [ 3028.157927] loop2: detected capacity change from 0 to 131072 [ 3028.160651] msdos: Unknown parameter 'audit' 16:05:59 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe", 0x99, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:05:59 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd6", 0xb3, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3028.207707] loop3: detected capacity change from 0 to 131072 [ 3028.213377] loop1: detected capacity change from 0 to 131072 [ 3028.218717] loop4: detected capacity change from 0 to 131072 [ 3028.219843] loop6: detected capacity change from 0 to 131072 [ 3028.221538] loop7: detected capacity change from 0 to 131072 [ 3028.227103] loop0: detected capacity change from 0 to 131072 16:06:00 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:00 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3028.276057] loop5: detected capacity change from 0 to 131072 [ 3028.281081] msdos: Unknown parameter 'audit' 16:06:00 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:00 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3028.302258] loop2: detected capacity change from 0 to 131072 [ 3028.317223] loop1: detected capacity change from 0 to 131072 [ 3028.324016] loop6: detected capacity change from 0 to 131072 16:06:00 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:00 executing program 7: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0) 16:06:00 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3028.354956] loop3: detected capacity change from 0 to 131072 16:06:00 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:00 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:00 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3028.424600] loop5: detected capacity change from 0 to 131072 [ 3028.431759] msdos: Unknown parameter 'audit' [ 3028.431964] loop4: detected capacity change from 0 to 131072 [ 3028.433438] loop1: detected capacity change from 0 to 131072 [ 3028.434663] loop0: detected capacity change from 0 to 131072 [ 3028.452325] loop7: detected capacity change from 0 to 131072 [ 3028.456742] loop6: detected capacity change from 0 to 131072 [ 3028.466955] loop3: detected capacity change from 0 to 131072 16:06:09 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:09 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe", 0x99, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:06:09 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:06:09 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:09 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:06:09 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, 0x0) 16:06:09 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:09 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3038.057069] loop6: detected capacity change from 0 to 131072 [ 3038.059785] loop3: detected capacity change from 0 to 131072 [ 3038.066020] loop1: detected capacity change from 0 to 131072 [ 3038.070529] loop5: detected capacity change from 0 to 131072 [ 3038.077708] loop4: detected capacity change from 0 to 131072 [ 3038.080941] loop0: detected capacity change from 0 to 131072 [ 3038.085640] msdos: Unknown parameter 'audit' [ 3038.093624] loop7: detected capacity change from 0 to 131072 [ 3038.096040] loop2: detected capacity change from 0 to 131072 16:06:09 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:09 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:09 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3038.234790] loop6: detected capacity change from 0 to 131072 [ 3038.240619] loop1: detected capacity change from 0 to 131072 16:06:19 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:06:19 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:06:19 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:19 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:06:19 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:19 executing program 0: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:06:19 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:19 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3048.244133] loop7: detected capacity change from 0 to 131072 [ 3048.248262] loop0: detected capacity change from 0 to 131072 [ 3048.252531] msdos: Unknown parameter 'audit' [ 3048.278485] loop6: detected capacity change from 0 to 131072 [ 3048.289403] loop1: detected capacity change from 0 to 131072 [ 3048.298921] No source specified [ 3048.302334] loop2: detected capacity change from 0 to 131072 [ 3048.308245] loop5: detected capacity change from 0 to 131072 [ 3048.312112] msdos: Unknown parameter 'audit' [ 3048.321022] msdos: Unknown parameter 'audit' 16:06:20 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:20 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:20 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:20 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:20 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:20 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:06:20 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3048.477742] loop7: detected capacity change from 0 to 131072 [ 3048.483636] loop0: detected capacity change from 0 to 131072 [ 3048.493031] msdos: Unknown parameter 'audit' [ 3048.496845] loop6: detected capacity change from 0 to 131072 16:06:20 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3048.525417] loop1: detected capacity change from 0 to 131072 [ 3048.567551] No source specified 16:06:20 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3048.598556] loop2: detected capacity change from 0 to 131072 [ 3048.618991] msdos: Unknown parameter 'audit' [ 3048.657452] kmemleak: Found object by alias at 0x607f1a63e724 [ 3048.657478] CPU: 1 UID: 0 PID: 16642 Comm: syz-executor.4 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary) [ 3048.657513] Tainted: [W]=WARN [ 3048.657519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3048.657532] Call Trace: [ 3048.657539] [ 3048.657548] dump_stack_lvl+0xca/0x120 [ 3048.657590] __lookup_object+0x94/0xb0 [ 3048.657622] delete_object_full+0x27/0x70 [ 3048.657652] free_percpu+0x30/0x1160 [ 3048.657683] ? arch_uprobe_clear_state+0x16/0x140 [ 3048.657720] futex_hash_free+0x38/0xc0 [ 3048.657746] mmput+0x2d3/0x390 [ 3048.657781] do_exit+0x79d/0x2970 [ 3048.657807] ? signal_wake_up_state+0x85/0x120 [ 3048.657836] ? zap_other_threads+0x2b9/0x3a0 [ 3048.657866] ? __pfx_do_exit+0x10/0x10 [ 3048.657891] ? do_group_exit+0x1c3/0x2a0 [ 3048.657917] ? lock_release+0xc8/0x290 [ 3048.657948] do_group_exit+0xd3/0x2a0 [ 3048.657976] __x64_sys_exit_group+0x3e/0x50 [ 3048.658010] x64_sys_call+0x18c5/0x18d0 [ 3048.658040] do_syscall_64+0xbf/0x360 [ 3048.658063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3048.658085] RIP: 0033:0x7f63268d6b19 [ 3048.658101] Code: Unable to access opcode bytes at 0x7f63268d6aef. [ 3048.658111] RSP: 002b:00007ffcc95b0018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3048.658133] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f63268d6b19 [ 3048.658147] RDX: 00007f632688972b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 3048.658161] RBP: 0000000000000000 R08: 0000001b2cf2001c R09: 0000000000000000 [ 3048.658174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3048.658187] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffcc95b0100 [ 3048.658216] [ 3048.658223] kmemleak: Object (percpu) 0x607f1a63e720 (size 8): [ 3048.658236] kmemleak: comm "syz-executor.7", pid 16648, jiffies 4297715568 [ 3048.658249] kmemleak: min_count = 1 [ 3048.658257] kmemleak: count = 0 [ 3048.658264] kmemleak: flags = 0x21 [ 3048.658271] kmemleak: checksum = 0 [ 3048.658278] kmemleak: backtrace: [ 3048.658284] pcpu_alloc_noprof+0x87a/0x1170 [ 3048.658314] percpu_ref_init+0x37/0x400 [ 3048.658333] io_uring_setup+0x44c/0x2000 [ 3048.658354] __x64_sys_io_uring_setup+0xc8/0x170 [ 3048.658376] do_syscall_64+0xbf/0x360 [ 3048.658394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3048.659291] loop7: detected capacity change from 0 to 131072 [ 3048.709571] loop5: detected capacity change from 0 to 131072 [ 3048.712618] msdos: Unknown parameter 'audit' 16:06:30 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:30 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:06:30 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:30 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:30 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:06:30 executing program 2: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)='Ku', 0x2, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:06:30 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:30 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3059.138869] No source specified [ 3059.143846] loop3: detected capacity change from 0 to 131072 [ 3059.148916] loop0: detected capacity change from 0 to 131072 [ 3059.158575] loop5: detected capacity change from 0 to 131072 [ 3059.163643] loop6: detected capacity change from 0 to 131072 [ 3059.176512] msdos: Unknown parameter 'audit' [ 3059.177347] loop2: detected capacity change from 0 to 131072 [ 3059.183599] loop7: detected capacity change from 0 to 131072 [ 3059.186239] msdos: Unknown parameter 'audit' [ 3059.192605] msdos: Unknown parameter 'audit' 16:06:31 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3059.280839] kmemleak: Found object by alias at 0x607f1a63e724 [ 3059.280865] CPU: 1 UID: 0 PID: 16660 Comm: syz-executor.4 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary) [ 3059.280892] Tainted: [W]=WARN [ 3059.280897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3059.280908] Call Trace: [ 3059.280914] [ 3059.280920] dump_stack_lvl+0xca/0x120 [ 3059.280956] __lookup_object+0x94/0xb0 [ 3059.280980] delete_object_full+0x27/0x70 [ 3059.281004] free_percpu+0x30/0x1160 [ 3059.281027] ? arch_uprobe_clear_state+0x16/0x140 [ 3059.281056] futex_hash_free+0x38/0xc0 [ 3059.281077] mmput+0x2d3/0x390 [ 3059.281111] do_exit+0x79d/0x2970 [ 3059.281140] ? signal_wake_up_state+0x85/0x120 [ 3059.281181] ? zap_other_threads+0x2b9/0x3a0 [ 3059.281208] ? __pfx_do_exit+0x10/0x10 [ 3059.281227] ? do_group_exit+0x1c3/0x2a0 [ 3059.281247] ? lock_release+0xc8/0x290 [ 3059.281271] do_group_exit+0xd3/0x2a0 [ 3059.281293] __x64_sys_exit_group+0x3e/0x50 [ 3059.281314] x64_sys_call+0x18c5/0x18d0 [ 3059.281336] do_syscall_64+0xbf/0x360 [ 3059.281354] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3059.281371] RIP: 0033:0x7f63268d6b19 [ 3059.281384] Code: Unable to access opcode bytes at 0x7f63268d6aef. [ 3059.281392] RSP: 002b:00007ffcc95b0018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3059.281408] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f63268d6b19 [ 3059.281419] RDX: 00007f632688972b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 3059.281430] RBP: 0000000000000000 R08: 0000001b2cf2001c R09: 0000000000000000 [ 3059.281440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3059.281450] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffcc95b0100 [ 3059.281472] [ 3059.281477] kmemleak: Object (percpu) 0x607f1a63e720 (size 8): [ 3059.281487] kmemleak: comm "syz-executor.2", pid 16671, jiffies 4297726147 [ 3059.281498] kmemleak: min_count = 1 [ 3059.281503] kmemleak: count = 0 [ 3059.281509] kmemleak: flags = 0x21 [ 3059.281514] kmemleak: checksum = 0 [ 3059.281519] kmemleak: backtrace: [ 3059.281524] pcpu_alloc_noprof+0x87a/0x1170 [ 3059.281547] percpu_ref_init+0x37/0x400 [ 3059.281562] io_uring_setup+0x44c/0x2000 [ 3059.281579] __x64_sys_io_uring_setup+0xc8/0x170 [ 3059.281596] do_syscall_64+0xbf/0x360 [ 3059.281609] entry_SYSCALL_64_after_hwframe+0x77/0x7f 16:06:31 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:31 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:31 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:06:31 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:31 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3059.421892] loop0: detected capacity change from 0 to 131072 [ 3059.422041] loop3: detected capacity change from 0 to 131072 [ 3059.425705] loop6: detected capacity change from 0 to 131072 [ 3059.429682] msdos: Unknown parameter 'audit' 16:06:31 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3059.460345] loop5: detected capacity change from 0 to 131072 16:06:31 executing program 2: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {0x0, 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3059.479586] msdos: Unknown parameter 'audit' 16:06:31 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) [ 3059.572887] FAT-fs (loop4): invalid media value (0xa4) [ 3059.573839] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3059.603585] loop2: detected capacity change from 0 to 131072 [ 3059.608502] msdos: Unknown parameter 'audit' 16:06:40 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:40 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:06:40 executing program 2: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:40 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:40 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:40 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:06:40 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:40 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3068.871865] loop3: detected capacity change from 0 to 131072 [ 3068.904895] loop0: detected capacity change from 0 to 131072 16:06:40 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3068.930711] loop6: detected capacity change from 0 to 131072 [ 3068.966557] loop5: detected capacity change from 0 to 131072 [ 3068.970965] loop2: detected capacity change from 0 to 131072 [ 3068.987879] msdos: Unknown parameter 'audit' 16:06:40 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3069.051110] loop3: detected capacity change from 0 to 131072 16:06:40 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) 16:06:40 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3069.076610] FAT-fs (loop4): invalid media value (0xa4) [ 3069.077525] FAT-fs (loop4): Can't find a valid FAT filesystem 16:06:40 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:06:40 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3069.128950] loop6: detected capacity change from 0 to 131072 [ 3069.136465] loop0: detected capacity change from 0 to 131072 16:06:40 executing program 2: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:40 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) [ 3069.180036] loop1: detected capacity change from 0 to 131072 [ 3069.217513] loop6: detected capacity change from 0 to 131072 [ 3069.281632] loop2: detected capacity change from 0 to 131072 [ 3069.323912] FAT-fs (loop4): invalid media value (0xa4) [ 3069.324810] FAT-fs (loop4): Can't find a valid FAT filesystem 16:06:49 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:49 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) [ 3077.351699] loop5: detected capacity change from 0 to 131072 16:06:49 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3077.353791] msdos: Unknown parameter 'audit' 16:06:49 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:06:49 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) 16:06:49 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:49 executing program 2: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:49 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3077.386057] loop1: detected capacity change from 0 to 131072 16:06:49 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:06:49 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) [ 3077.424817] loop0: detected capacity change from 0 to 131072 [ 3077.425085] loop2: detected capacity change from 0 to 131072 [ 3077.426812] loop3: detected capacity change from 0 to 131072 [ 3077.427297] loop6: detected capacity change from 0 to 131072 [ 3077.428414] loop4: detected capacity change from 0 to 131072 16:06:49 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3077.458208] FAT-fs (loop4): bogus number of reserved sectors [ 3077.459174] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3077.489076] loop1: detected capacity change from 0 to 131072 16:06:49 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3077.519791] loop5: detected capacity change from 0 to 131072 [ 3077.532744] loop3: detected capacity change from 0 to 131072 [ 3077.539047] msdos: Unknown parameter 'audit' 16:06:58 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) 16:06:58 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:06:58 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) 16:06:58 executing program 7: delete_module(0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 16:06:58 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:58 executing program 2: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:06:58 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:58 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3086.985290] loop6: detected capacity change from 0 to 131072 [ 3087.027606] loop0: detected capacity change from 0 to 131072 [ 3087.037023] loop1: detected capacity change from 0 to 131072 [ 3087.038223] FAT-fs (loop4): invalid media value (0xa4) [ 3087.038701] FAT-fs (loop4): Can't find a valid FAT filesystem 16:06:58 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) 16:06:58 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3087.067522] loop5: detected capacity change from 0 to 131072 [ 3087.069737] msdos: Unknown parameter 'audit' 16:06:58 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:58 executing program 2: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 16:06:58 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3087.120645] loop5: detected capacity change from 0 to 131072 [ 3087.126002] msdos: Unknown parameter 'audit' 16:06:58 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3087.163771] FAT-fs (loop4): invalid media value (0xa4) [ 3087.164283] FAT-fs (loop4): Can't find a valid FAT filesystem 16:06:58 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:06:58 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:06:58 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) [ 3087.263500] loop6: detected capacity change from 0 to 131072 [ 3087.300388] loop1: detected capacity change from 0 to 131072 16:07:10 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:07:10 executing program 2: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:07:10 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]}) 16:07:10 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:07:10 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:07:10 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:10 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:10 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3098.311620] loop1: detected capacity change from 0 to 131072 16:07:10 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3098.366479] FAT-fs (loop4): invalid media value (0xa4) [ 3098.366926] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3098.399498] loop6: detected capacity change from 0 to 131072 [ 3098.401802] loop1: detected capacity change from 0 to 131072 16:07:10 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:07:10 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:07:10 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:10 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:10 executing program 2: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:07:10 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:10 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:07:10 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) [ 3098.564336] loop3: detected capacity change from 0 to 131072 [ 3098.590460] loop4: detected capacity change from 0 to 131072 [ 3098.610364] FAT-fs (loop4): bogus number of reserved sectors [ 3098.611299] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3098.671586] loop6: detected capacity change from 0 to 131072 16:07:20 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:07:20 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:07:20 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) 16:07:20 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:20 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, 0x0) 16:07:20 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:20 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:07:20 executing program 2: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) [ 3108.448356] loop1: detected capacity change from 0 to 131072 [ 3108.454817] loop3: detected capacity change from 0 to 131072 16:07:20 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 16:07:20 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031", 0x72, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3108.545380] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3108.546698] loop6: detected capacity change from 0 to 131072 [ 3108.547088] FAT-fs (loop4): unable to read boot sector [ 3108.561101] loop1: detected capacity change from 0 to 131072 16:07:20 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:07:20 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3108.663857] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3108.665190] FAT-fs (loop4): unable to read boot sector 16:07:29 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:07:29 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:07:29 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 16:07:29 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]}) 16:07:29 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:29 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:29 executing program 2: delete_module(0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 16:07:29 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3117.468335] loop6: detected capacity change from 0 to 131072 [ 3117.503000] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3117.504569] FAT-fs (loop4): unable to read boot sector [ 3117.507094] loop1: detected capacity change from 0 to 131072 [ 3117.512078] loop3: detected capacity change from 0 to 131072 16:07:29 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3117.550331] FAT-fs (loop3): bogus number of reserved sectors [ 3117.551542] FAT-fs (loop3): Can't find a valid FAT filesystem 16:07:29 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:29 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0) 16:07:29 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 16:07:29 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 16:07:29 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) [ 3117.679565] loop6: detected capacity change from 0 to 131072 [ 3117.703061] loop4: detected capacity change from 0 to 131072 16:07:29 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3117.713133] loop1: detected capacity change from 0 to 131072 16:07:29 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:29 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:29 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:07:29 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:29 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0) [ 3117.852581] loop3: detected capacity change from 0 to 131072 [ 3117.876562] FAT-fs (loop3): bogus number of reserved sectors [ 3117.877446] loop6: detected capacity change from 0 to 131072 [ 3117.878344] FAT-fs (loop3): Can't find a valid FAT filesystem [ 3117.878898] loop0: detected capacity change from 0 to 131072 [ 3117.904434] loop4: detected capacity change from 0 to 131072 [ 3117.913858] loop1: detected capacity change from 0 to 131072 16:07:40 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:40 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:07:40 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:07:40 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0) 16:07:40 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:40 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:40 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:07:40 executing program 7: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:07:40 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0)) [ 3128.928842] loop6: detected capacity change from 0 to 131072 [ 3128.931879] loop1: detected capacity change from 0 to 131072 [ 3128.940595] loop0: detected capacity change from 0 to 131072 [ 3128.948960] loop3: detected capacity change from 0 to 131072 [ 3128.967908] FAT-fs (loop7): invalid media value (0xa4) [ 3128.968792] FAT-fs (loop7): Can't find a valid FAT filesystem [ 3128.971751] loop4: detected capacity change from 0 to 131072 [ 3128.985201] FAT-fs (loop3): bogus number of reserved sectors [ 3128.986047] FAT-fs (loop3): Can't find a valid FAT filesystem 16:07:40 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:40 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:40 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:40 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:07:40 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3129.144046] loop0: detected capacity change from 0 to 131072 [ 3129.145386] loop7: detected capacity change from 0 to 131072 [ 3129.186847] loop1: detected capacity change from 0 to 131072 [ 3129.220085] loop6: detected capacity change from 0 to 131072 16:07:50 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:07:50 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}]}) 16:07:50 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:50 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:50 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:50 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 16:07:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3138.713020] loop0: detected capacity change from 0 to 131072 [ 3138.725678] loop6: detected capacity change from 0 to 131072 [ 3138.754719] loop4: detected capacity change from 0 to 131072 [ 3138.756955] loop3: detected capacity change from 0 to 131072 [ 3138.767329] loop1: detected capacity change from 0 to 131072 [ 3138.773991] FAT-fs (loop4): bogus number of reserved sectors [ 3138.774885] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3138.805343] loop7: detected capacity change from 0 to 131072 16:07:50 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:50 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:50 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:07:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 16:07:50 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:07:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:07:50 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}]}) 16:07:50 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3138.937048] loop0: detected capacity change from 0 to 131072 [ 3138.970884] loop1: detected capacity change from 0 to 131072 [ 3138.976687] loop6: detected capacity change from 0 to 131072 16:07:50 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3139.025439] loop3: detected capacity change from 0 to 131072 [ 3139.046574] loop4: detected capacity change from 0 to 131072 [ 3139.075191] FAT-fs (loop4): bogus number of reserved sectors [ 3139.076069] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3139.098609] loop7: detected capacity change from 0 to 131072 [ 3139.149515] loop0: detected capacity change from 0 to 131072 16:08:00 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:08:00 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:00 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:00 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 16:08:00 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:00 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:00 executing program 4: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)) [ 3148.309952] loop6: detected capacity change from 0 to 131072 [ 3148.313269] loop3: detected capacity change from 0 to 131072 [ 3148.335459] loop4: detected capacity change from 0 to 131072 [ 3148.340582] loop1: detected capacity change from 0 to 131072 [ 3148.359227] FAT-fs (loop4): bogus number of reserved sectors [ 3148.360186] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3148.364045] loop7: detected capacity change from 0 to 131072 16:08:00 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:00 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:00 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:00 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:00 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:00 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:08:00 executing program 5: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) [ 3148.521870] loop6: detected capacity change from 0 to 131072 [ 3148.523752] loop3: detected capacity change from 0 to 131072 [ 3148.598420] loop1: detected capacity change from 0 to 131072 [ 3148.623366] loop2: detected capacity change from 0 to 131072 16:08:00 executing program 6: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3148.641750] msdos: Unknown parameter 'audit' [ 3148.691104] loop6: detected capacity change from 0 to 131072 16:08:10 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:10 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:10 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:10 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:10 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:08:10 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 16:08:10 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:10 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3159.237526] loop1: detected capacity change from 0 to 131072 [ 3159.263774] loop3: detected capacity change from 0 to 131072 [ 3159.276689] loop2: detected capacity change from 0 to 131072 [ 3159.285293] loop4: detected capacity change from 0 to 131072 [ 3159.294885] msdos: Unknown parameter 'audit' [ 3159.296294] msdos: Unknown parameter 'audit' [ 3159.312461] loop6: detected capacity change from 0 to 131072 16:08:11 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:11 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:08:11 executing program 5: r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:08:11 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:11 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:11 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:11 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {0x0, 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:11 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3159.511128] loop1: detected capacity change from 0 to 131072 [ 3159.515911] loop0: detected capacity change from 0 to 131072 [ 3159.537593] loop3: detected capacity change from 0 to 131072 [ 3159.542681] loop4: detected capacity change from 0 to 131072 [ 3159.554197] msdos: Unknown parameter 'audit' 16:08:11 executing program 5: r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) [ 3159.612554] loop6: detected capacity change from 0 to 131072 [ 3159.621937] loop2: detected capacity change from 0 to 131072 16:08:19 executing program 6: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:19 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:19 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:19 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:19 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:19 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:19 executing program 5: r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:08:19 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) [ 3167.483445] loop0: detected capacity change from 0 to 131072 [ 3167.513849] No source specified 16:08:19 executing program 7: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) [ 3167.525950] loop1: detected capacity change from 0 to 131072 16:08:19 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0) [ 3167.541188] loop6: detected capacity change from 0 to 131072 [ 3167.549237] msdos: Unknown parameter 'audit' [ 3167.562684] loop4: detected capacity change from 0 to 131072 [ 3167.569317] loop2: detected capacity change from 0 to 131072 16:08:19 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3167.605329] loop0: detected capacity change from 0 to 131072 16:08:19 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) [ 3167.634960] No source specified 16:08:28 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:08:28 executing program 7: delete_module(0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 16:08:28 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:28 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:28 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:28 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0) 16:08:28 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:28 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3176.402100] loop4: detected capacity change from 0 to 131072 16:08:28 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) [ 3176.445161] loop2: detected capacity change from 0 to 131072 [ 3176.446486] loop0: detected capacity change from 0 to 131072 [ 3176.449981] loop6: detected capacity change from 0 to 131072 [ 3176.474813] loop1: detected capacity change from 0 to 131072 [ 3176.481842] No source specified 16:08:28 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:28 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0) 16:08:28 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3176.555694] loop0: detected capacity change from 0 to 131072 16:08:28 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) [ 3176.579366] loop2: detected capacity change from 0 to 131072 16:08:28 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:28 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, 0x0) 16:08:28 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:28 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:28 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:08:28 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:28 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3176.692186] loop0: detected capacity change from 0 to 131072 [ 3176.701844] loop2: detected capacity change from 0 to 131072 [ 3176.715681] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3176.719111] FAT-fs (loop3): unable to read boot sector [ 3176.720474] loop1: detected capacity change from 0 to 131072 16:08:28 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3176.741962] loop6: detected capacity change from 0 to 131072 16:08:28 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3176.754791] msdos: Unknown parameter 'audit' 16:08:28 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3176.794686] loop0: detected capacity change from 0 to 131072 [ 3176.808558] loop4: detected capacity change from 0 to 131072 [ 3176.815817] msdos: Unknown parameter 'audit' 16:08:37 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:08:37 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:37 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:37 executing program 5: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:08:37 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:37 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:37 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:37 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3185.841789] loop0: detected capacity change from 0 to 131072 [ 3185.855368] loop2: detected capacity change from 0 to 131072 [ 3185.914394] loop1: detected capacity change from 0 to 131072 [ 3185.925857] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3185.927820] FAT-fs (loop3): unable to read boot sector [ 3185.945255] loop6: detected capacity change from 0 to 131072 [ 3185.947872] loop4: detected capacity change from 0 to 131072 [ 3185.956608] msdos: Unknown parameter 'audit' 16:08:46 executing program 5: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0)) 16:08:46 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:46 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:46 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:08:46 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {0x0, 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:46 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:46 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:46 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3194.361020] loop0: detected capacity change from 0 to 131072 16:08:46 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 16:08:46 executing program 5: syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0)) [ 3194.408631] loop6: detected capacity change from 0 to 131072 [ 3194.410627] loop2: detected capacity change from 0 to 131072 16:08:46 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3194.416323] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3194.417717] FAT-fs (loop3): unable to read boot sector [ 3194.422026] loop1: detected capacity change from 0 to 131072 [ 3194.430042] msdos: Unknown parameter 'audit' [ 3194.459590] loop0: detected capacity change from 0 to 131072 16:08:46 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:46 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f00000012c0)) 16:08:46 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:46 executing program 1: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:46 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:46 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3194.554893] loop0: detected capacity change from 0 to 131072 16:08:46 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 16:08:46 executing program 6: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:46 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) [ 3194.598073] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3194.600796] FAT-fs (loop6): unable to read boot sector [ 3194.616886] loop1: detected capacity change from 0 to 131072 [ 3194.641876] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3194.644917] FAT-fs (loop3): unable to read boot sector [ 3194.680520] loop2: detected capacity change from 0 to 131072 16:08:54 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:54 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:08:54 executing program 1: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:54 executing program 2: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:54 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:08:54 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:54 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 16:08:54 executing program 6: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) [ 3203.246568] loop0: detected capacity change from 0 to 131072 [ 3203.254912] loop2: detected capacity change from 0 to 131072 [ 3203.256400] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3203.258317] FAT-fs (loop3): unable to read boot sector [ 3203.275957] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3203.276872] FAT-fs (loop6): unable to read boot sector [ 3203.285565] loop5: detected capacity change from 0 to 131072 16:08:55 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]}) 16:08:55 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3203.309669] loop1: detected capacity change from 0 to 131072 16:08:55 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3203.344026] loop0: detected capacity change from 0 to 131072 16:08:55 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) [ 3203.381674] loop2: detected capacity change from 0 to 131072 16:08:55 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]}) 16:08:55 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}]}) 16:08:55 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:08:55 executing program 1: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3203.461944] loop0: detected capacity change from 0 to 131072 [ 3203.478294] loop6: detected capacity change from 0 to 131072 [ 3203.486330] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3203.488349] FAT-fs (loop3): unable to read boot sector [ 3203.588544] loop1: detected capacity change from 0 to 131072 16:09:02 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}]}) 16:09:02 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:02 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:02 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0) 16:09:02 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:02 executing program 2: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:02 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:02 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3211.267614] loop6: detected capacity change from 0 to 131072 [ 3211.273560] loop5: detected capacity change from 0 to 131072 [ 3211.293982] loop0: detected capacity change from 0 to 131072 [ 3211.316632] loop3: detected capacity change from 0 to 131072 16:09:03 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:03 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3211.327700] loop2: detected capacity change from 0 to 131072 [ 3211.338881] loop1: detected capacity change from 0 to 131072 16:09:03 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3211.348338] loop7: detected capacity change from 0 to 131072 [ 3211.351052] msdos: Unknown parameter 'audit' 16:09:03 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) [ 3211.385967] loop6: detected capacity change from 0 to 131072 16:09:03 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0) [ 3211.389719] loop5: detected capacity change from 0 to 131072 [ 3211.421989] loop0: detected capacity change from 0 to 131072 16:09:03 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:03 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:03 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3211.507692] loop3: detected capacity change from 0 to 131072 [ 3211.561056] loop1: detected capacity change from 0 to 131072 [ 3211.570014] loop7: detected capacity change from 0 to 131072 [ 3211.571455] msdos: Unknown parameter 'audit' 16:09:17 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}]}) 16:09:17 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:09:17 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:17 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:09:17 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:17 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0) 16:09:17 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 3225.908628] loop0: detected capacity change from 0 to 131072 [ 3225.929946] loop7: detected capacity change from 0 to 131072 [ 3225.933237] loop3: detected capacity change from 0 to 131072 [ 3225.935926] loop5: detected capacity change from 0 to 131072 [ 3225.949093] loop2: detected capacity change from 0 to 131072 [ 3225.982118] FAT-fs (loop1): invalid media value (0x82) [ 3225.983030] FAT-fs (loop1): Can't find a valid FAT filesystem 16:09:17 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) [ 3226.060888] FAT-fs (loop6): invalid media value (0x82) [ 3226.061826] FAT-fs (loop6): Can't find a valid FAT filesystem 16:09:17 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)) 16:09:17 executing program 7: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:17 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:17 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}]}) 16:09:17 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3226.158005] loop7: detected capacity change from 0 to 131072 [ 3226.159718] loop2: detected capacity change from 0 to 131072 [ 3226.166516] msdos: Unknown parameter 'audit' 16:09:17 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3226.216909] loop1: detected capacity change from 0 to 131072 16:09:17 executing program 6: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:17 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3226.257439] loop0: detected capacity change from 0 to 131072 16:09:18 executing program 2: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3226.264995] loop3: detected capacity change from 0 to 131072 [ 3226.289878] loop5: detected capacity change from 0 to 131072 [ 3226.293242] loop6: detected capacity change from 0 to 131072 [ 3226.300054] msdos: Unknown parameter 'audit' [ 3226.305212] FAT-fs (loop3): bogus number of reserved sectors [ 3226.306730] FAT-fs (loop3): Can't find a valid FAT filesystem 16:09:18 executing program 1: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3226.389390] loop2: detected capacity change from 0 to 131072 [ 3226.391403] loop7: detected capacity change from 0 to 131072 [ 3226.401910] msdos: Unknown parameter 'audit' 16:09:18 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0)) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:18 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3226.515478] loop1: detected capacity change from 0 to 131072 [ 3226.526936] msdos: Unknown parameter 'audit' 16:09:28 executing program 0: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)) 16:09:28 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:28 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:28 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:28 executing program 7: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:09:28 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:28 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:28 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}]}) [ 3236.945804] loop3: detected capacity change from 0 to 131072 [ 3236.951270] loop1: detected capacity change from 0 to 131072 [ 3236.955375] loop2: detected capacity change from 0 to 131072 [ 3236.958356] FAT-fs (loop3): bogus number of reserved sectors [ 3236.958850] FAT-fs (loop3): Can't find a valid FAT filesystem [ 3237.010511] loop0: detected capacity change from 0 to 131072 16:09:28 executing program 3: syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)) 16:09:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:09:28 executing program 1: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3237.082460] loop3: detected capacity change from 0 to 131072 16:09:28 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:28 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3237.104985] FAT-fs (loop3): bogus number of reserved sectors [ 3237.105493] FAT-fs (loop3): Can't find a valid FAT filesystem [ 3237.130023] loop1: detected capacity change from 0 to 131072 [ 3237.141691] msdos: Unknown parameter 'audit' 16:09:39 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:39 executing program 4: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:39 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:39 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:09:39 executing program 0: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:39 executing program 7: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:09:39 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3247.397571] loop1: detected capacity change from 0 to 131072 [ 3247.409386] loop3: detected capacity change from 0 to 131072 [ 3247.420738] loop0: detected capacity change from 0 to 131072 16:09:39 executing program 4: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:09:39 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:39 executing program 7: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:09:39 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:50 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) 16:09:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:50 executing program 4: syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:50 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:50 executing program 7: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) 16:09:50 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3258.341542] loop1: detected capacity change from 0 to 131072 [ 3258.366502] loop3: detected capacity change from 0 to 131072 [ 3258.376788] loop0: detected capacity change from 0 to 131072 16:09:50 executing program 7: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) 16:09:50 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:50 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:50 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:50 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:50 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) 16:09:50 executing program 3: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) [ 3258.529112] loop1: detected capacity change from 0 to 131072 16:09:50 executing program 0: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:50 executing program 7: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) [ 3258.607800] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3258.612361] FAT-fs (loop3): unable to read boot sector [ 3258.651042] loop0: detected capacity change from 0 to 131072 [ 3258.662589] msdos: Unknown parameter 'audit' 16:09:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:09:59 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) 16:09:59 executing program 3: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:59 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) 16:09:59 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:59 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:59 executing program 7: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:09:59 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:09:59 executing program 5: delete_module(0x0, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:09:59 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3267.338774] loop1: detected capacity change from 0 to 131072 [ 3267.343893] loop3: detected capacity change from 0 to 131072 [ 3267.354260] msdos: Unknown parameter 'audit' [ 3267.371998] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3267.377285] FAT-fs (loop0): unable to read boot sector 16:09:59 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:07 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:10:07 executing program 6: delete_module(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:07 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:07 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:07 executing program 7: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:10:07 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:10:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:10:07 executing program 5: io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3275.852247] loop1: detected capacity change from 0 to 131072 16:10:07 executing program 7: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3275.882014] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3275.888207] FAT-fs (loop3): unable to read boot sector [ 3275.891794] loop0: detected capacity change from 0 to 131072 [ 3275.905790] msdos: Unknown parameter 'audit' 16:10:07 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) 16:10:07 executing program 5: io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:07 executing program 6: syz_open_dev$vcsn(0x0, 0x5f, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:07 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:10:07 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3275.976518] loop1: detected capacity change from 0 to 131072 16:10:07 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:10:07 executing program 7: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x0, 0x0) 16:10:07 executing program 5: io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:07 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:07 executing program 6: syz_open_dev$vcsn(0x0, 0x0, 0x800) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:07 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:07 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:10:07 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:07 executing program 5: io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:07 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:10:07 executing program 6: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3276.187825] loop0: detected capacity change from 0 to 131072 [ 3276.206649] msdos: Unknown parameter 'audit' [ 3276.228966] loop1: detected capacity change from 0 to 131072 16:10:15 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:15 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:15 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:10:15 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:10:15 executing program 5: io_uring_setup(0x3a2f, 0x0) 16:10:15 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x0, 0x0) 16:10:15 executing program 6: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:15 executing program 7: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) [ 3284.014123] loop0: detected capacity change from 0 to 131072 [ 3284.019065] msdos: Unknown parameter 'audit' 16:10:15 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:10:15 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3284.070561] loop1: detected capacity change from 0 to 131072 16:10:15 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:10:15 executing program 6: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3284.166999] loop4: detected capacity change from 0 to 131072 [ 3284.168822] loop0: detected capacity change from 0 to 131072 [ 3284.170685] msdos: Unknown parameter 'audit' [ 3284.173264] msdos: Unknown parameter 'audit' 16:10:24 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:24 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:24 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:10:24 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:10:24 executing program 5: io_uring_setup(0x3a2f, 0x0) 16:10:24 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:24 executing program 2: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:24 executing program 6: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3293.164918] loop7: detected capacity change from 0 to 131072 [ 3293.172439] msdos: Unknown parameter 'audit' [ 3293.193623] loop4: detected capacity change from 0 to 131072 16:10:24 executing program 5: io_uring_setup(0x3a2f, 0x0) 16:10:24 executing program 6: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3293.215630] loop2: detected capacity change from 0 to 131072 [ 3293.217780] loop0: detected capacity change from 0 to 131072 [ 3293.222628] msdos: Unknown parameter 'audit' [ 3293.226544] msdos: Unknown parameter 'audit' [ 3293.226548] loop1: detected capacity change from 0 to 131072 [ 3293.235696] msdos: Unknown parameter 'audit' 16:10:24 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3293.289724] loop7: detected capacity change from 0 to 131072 16:10:25 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:25 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3293.294332] msdos: Unknown parameter 'audit' 16:10:25 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:10:25 executing program 2: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:25 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:25 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3293.388052] loop2: detected capacity change from 0 to 131072 [ 3293.392680] loop7: detected capacity change from 0 to 131072 [ 3293.395179] msdos: Unknown parameter 'audit' [ 3293.402696] msdos: Unknown parameter 'audit' [ 3293.416118] loop1: detected capacity change from 0 to 131072 [ 3293.428934] loop0: detected capacity change from 0 to 131072 [ 3293.438949] msdos: Unknown parameter 'audit' [ 3293.493030] loop4: detected capacity change from 0 to 131072 [ 3293.500472] msdos: Unknown parameter 'audit' 16:10:34 executing program 5: io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x10, 0x1, 0x2d3}) 16:10:34 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:10:34 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) 16:10:34 executing program 2: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:34 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:34 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:34 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) [ 3303.065946] loop4: detected capacity change from 0 to 131072 [ 3303.069726] loop2: detected capacity change from 0 to 131072 [ 3303.074387] msdos: Unknown parameter 'audit' [ 3303.077266] msdos: Unknown parameter 'audit' [ 3303.104458] loop7: detected capacity change from 0 to 131072 [ 3303.112682] msdos: Unknown parameter 'audit' 16:10:34 executing program 5: io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x1, 0x2d3}) [ 3303.114291] loop1: detected capacity change from 0 to 131072 16:10:34 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) 16:10:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:10:34 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) 16:10:34 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) [ 3303.199897] loop4: detected capacity change from 0 to 131072 [ 3303.206110] msdos: Unknown parameter 'audit' 16:10:34 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3303.251061] FAT-fs (loop2): invalid media value (0x82) [ 3303.251593] FAT-fs (loop2): Can't find a valid FAT filesystem 16:10:34 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3303.350791] loop1: detected capacity change from 0 to 131072 [ 3303.373866] loop7: detected capacity change from 0 to 131072 [ 3303.379578] msdos: Unknown parameter 'audit' 16:10:44 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:10:44 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:44 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:10:44 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:44 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) 16:10:44 executing program 5: io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x2d3}) 16:10:44 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) 16:10:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:10:44 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) [ 3312.632094] loop1: detected capacity change from 0 to 131072 [ 3312.683456] loop4: detected capacity change from 0 to 131072 [ 3312.699819] msdos: Unknown parameter 'audit' [ 3312.725826] FAT-fs (loop6): invalid media value (0x82) [ 3312.726662] FAT-fs (loop6): Can't find a valid FAT filesystem 16:10:44 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3312.801745] FAT-fs (loop2): invalid media value (0x82) [ 3312.802902] FAT-fs (loop2): Can't find a valid FAT filesystem 16:10:44 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) 16:10:44 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:44 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:10:44 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:10:44 executing program 5: io_uring_setup(0x3a2f, &(0x7f0000001a80)) 16:10:44 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) [ 3312.903871] loop1: detected capacity change from 0 to 131072 [ 3312.909675] FAT-fs (loop6): invalid media value (0x82) [ 3312.910662] FAT-fs (loop6): Can't find a valid FAT filesystem 16:10:44 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0) 16:10:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:10:44 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3313.025660] loop1: detected capacity change from 0 to 131072 16:10:44 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) [ 3313.180059] FAT-fs (loop2): invalid media value (0x82) [ 3313.181037] FAT-fs (loop2): Can't find a valid FAT filesystem [ 3313.248958] FAT-fs (loop6): invalid media value (0x82) [ 3313.250030] FAT-fs (loop6): Can't find a valid FAT filesystem 16:10:53 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:10:53 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) 16:10:53 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:10:53 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x0, 0x0) 16:10:53 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) 16:10:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:10:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) 16:10:53 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3321.896305] loop1: detected capacity change from 0 to 131072 16:10:53 executing program 0: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:10:53 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3321.996634] loop1: detected capacity change from 0 to 131072 [ 3322.007953] FAT-fs (loop6): invalid media value (0x82) [ 3322.008891] FAT-fs (loop6): Can't find a valid FAT filesystem [ 3322.023808] FAT-fs (loop2): invalid media value (0x82) [ 3322.024874] FAT-fs (loop2): Can't find a valid FAT filesystem 16:11:02 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:02 executing program 1: delete_module(&(0x7f0000000000)='@\x00', 0x0) syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:11:02 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) 16:11:02 executing program 0: delete_module(0x0, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:11:02 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) 16:11:02 executing program 5: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) [ 3331.181932] loop1: detected capacity change from 0 to 131072 [ 3331.230617] FAT-fs (loop2): invalid media value (0x82) [ 3331.231125] FAT-fs (loop2): Can't find a valid FAT filesystem [ 3331.232121] FAT-fs (loop3): invalid media value (0x82) [ 3331.232575] FAT-fs (loop3): Can't find a valid FAT filesystem [ 3331.260029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3331.270250] FAT-fs (loop5): unable to read boot sector [ 3331.293342] FAT-fs (loop3): invalid media value (0x82) [ 3331.293806] FAT-fs (loop3): Can't find a valid FAT filesystem 16:11:03 executing program 3: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) 16:11:03 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:11:03 executing program 3: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x8e) 16:11:03 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:03 executing program 1: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:11:03 executing program 0: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) [ 3331.415842] FAT-fs (loop3): invalid media value (0x82) [ 3331.416628] FAT-fs (loop3): Can't find a valid FAT filesystem 16:11:03 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) 16:11:03 executing program 3: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x8e) [ 3331.532263] loop1: detected capacity change from 0 to 131072 [ 3331.571503] FAT-fs (loop2): invalid media value (0x82) [ 3331.572420] FAT-fs (loop2): Can't find a valid FAT filesystem [ 3331.645737] FAT-fs (loop3): invalid media value (0x82) [ 3331.646587] FAT-fs (loop3): Can't find a valid FAT filesystem 16:11:12 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:13 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x8e) 16:11:13 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) 16:11:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:13 executing program 0: syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:13 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:11:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) [ 3341.289378] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3341.291555] FAT-fs (loop5): unable to read boot sector [ 3341.354940] loop1: detected capacity change from 0 to 131072 16:11:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:13 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:13 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) [ 3341.419566] FAT-fs (loop3): invalid media value (0x82) [ 3341.420483] FAT-fs (loop3): Can't find a valid FAT filesystem 16:11:13 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:13 executing program 0: syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:13 executing program 4: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3341.561908] FAT-fs (loop3): invalid media value (0x82) [ 3341.562867] FAT-fs (loop3): Can't find a valid FAT filesystem [ 3341.591295] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3341.592813] FAT-fs (loop6): unable to read boot sector [ 3341.601586] loop5: detected capacity change from 0 to 131072 [ 3341.604787] msdos: Unknown parameter 'audit' 16:11:13 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:11:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{0x0}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) [ 3341.691959] loop1: detected capacity change from 0 to 131072 16:11:13 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) 16:11:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:13 executing program 4: delete_module(0x0, 0x0) syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:13 executing program 0: syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) [ 3341.806549] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3341.809292] FAT-fs (loop5): unable to read boot sector [ 3341.842102] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3341.845679] FAT-fs (loop6): unable to read boot sector 16:11:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:22 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:11:22 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:22 executing program 0: syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:22 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:22 executing program 6: delete_module(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:22 executing program 4: syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:22 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:11:22 executing program 4: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:22 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) [ 3350.879911] loop5: detected capacity change from 0 to 131072 [ 3350.883246] msdos: Unknown parameter 'audit' [ 3350.895725] loop6: detected capacity change from 0 to 131072 [ 3350.907646] msdos: Unknown parameter 'audit' [ 3350.918493] loop1: detected capacity change from 0 to 131072 16:11:22 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) 16:11:22 executing program 4: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000280)) 16:11:22 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:22 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:22 executing program 0: syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) [ 3351.011673] loop5: detected capacity change from 0 to 131072 [ 3351.017015] msdos: Unknown parameter 'audit' 16:11:31 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:31 executing program 0: syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:31 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x8e) 16:11:31 executing program 4: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 16:11:31 executing program 1: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:11:31 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) 16:11:31 executing program 7: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:31 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3359.661919] loop5: detected capacity change from 0 to 131072 [ 3359.665613] msdos: Unknown parameter 'audit' [ 3359.717088] loop1: detected capacity change from 0 to 131072 [ 3359.742312] FAT-fs (loop6): invalid media value (0x82) [ 3359.743202] FAT-fs (loop6): Can't find a valid FAT filesystem 16:11:40 executing program 7: io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:40 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) 16:11:40 executing program 6: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x8e) 16:11:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:40 executing program 4: r0 = syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000001240)='.log\x00', 0x40, 0x8e) 16:11:40 executing program 0: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:40 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:40 executing program 1: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) 16:11:40 executing program 7: io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) [ 3368.624212] No source specified [ 3368.634535] loop5: detected capacity change from 0 to 131072 16:11:40 executing program 1: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) [ 3368.645735] msdos: Unknown parameter 'audit' 16:11:40 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) [ 3368.694272] FAT-fs (loop6): invalid media value (0x82) [ 3368.694848] FAT-fs (loop6): Can't find a valid FAT filesystem 16:11:40 executing program 6: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:40 executing program 1: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:11:40 executing program 7: io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:40 executing program 0: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:40 executing program 7: io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0) [ 3368.804593] No source specified 16:11:40 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2) 16:11:40 executing program 7: io_uring_setup(0x3a2f, 0x0) 16:11:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:40 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) 16:11:40 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000001240)='.log\x00', 0x40, 0x8e) [ 3368.936915] No source specified [ 3368.942296] loop5: detected capacity change from 0 to 131072 [ 3368.953876] msdos: Unknown parameter 'audit' 16:11:50 executing program 7: io_uring_setup(0x3a2f, 0x0) 16:11:50 executing program 6: r0 = syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0)) openat$incfs(r0, &(0x7f0000001240)='.log\x00', 0x40, 0x8e) 16:11:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) 16:11:50 executing program 0: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:11:50 executing program 4: delete_module(&(0x7f0000000000)='@\x00', 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3}) 16:11:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:50 executing program 1: syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:11:50 executing program 5: delete_module(0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]}) syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001) [ 3378.429038] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3378.433116] loop5: detected capacity change from 0 to 131072 [ 3378.433239] ------------[ cut here ]------------ [ 3378.434238] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3378.434898] percpu ref (io_ring_ctx_ref_free) <= 0 (0) after switching to atomic [ 3378.436548] WARNING: lib/percpu-refcount.c:197 at percpu_ref_switch_to_atomic_rcu+0x3cc/0x480, CPU#0: syz-executor.5/18028 [ 3378.438212] FAT-fs (loop2): unable to read boot sector [ 3378.439212] Modules linked in: [ 3378.440520] CPU: 0 UID: 0 PID: 18028 Comm: syz-executor.5 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary) [ 3378.442277] Tainted: [W]=WARN [ 3378.442738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3378.443970] RIP: 0010:percpu_ref_switch_to_atomic_rcu+0x3cc/0x480 [ 3378.444929] Code: 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 9e 00 00 00 49 8b 75 e8 48 c7 c7 c0 99 e2 84 e8 25 ac e9 fe 90 <0f> 0b 90 90 e9 2b ff ff ff e8 56 de 5f ff e9 9e fe ff ff e8 dc de [ 3378.447618] RSP: 0018:ffff88806ce08e20 EFLAGS: 00010286 [ 3378.448428] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8139de70 [ 3378.449039] loop4: detected capacity change from 0 to 131072 [ 3378.449481] RDX: ffff888015755280 RSI: ffffffff8139de7e RDI: 0000000000000001 [ 3378.451392] RBP: 7fffffffffffffff R08: 0000000000000001 R09: ffffed100d9c117f [ 3378.452471] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800db60980 [ 3378.453542] R13: ffff88800db609a0 R14: 0000000000000002 R15: 0000000000000003 [ 3378.454624] FS: 00007f8e5d7e9700(0000) GS:ffff8880e55d8000(0000) knlGS:0000000000000000 [ 3378.457088] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3378.460893] CR2: 00007fcfbfc9d018 CR3: 000000000f673000 CR4: 0000000000350ef0 [ 3378.463346] Call Trace: [ 3378.463747] [ 3378.464022] msdos: Unknown parameter 'audit' [ 3378.464076] ? rcu_core+0x7c3/0x1800 [ 3378.465296] rcu_core+0x7c8/0x1800 [ 3378.465843] ? __pfx_rcu_core+0x10/0x10 [ 3378.466461] ? mark_held_locks+0x49/0x80 [ 3378.467074] handle_softirqs+0x1b1/0x770 [ 3378.467730] __irq_exit_rcu+0xc4/0x100 [ 3378.468347] irq_exit_rcu+0x9/0x20 [ 3378.468877] sysvec_apic_timer_interrupt+0x70/0x80 [ 3378.469633] [ 3378.469974] [ 3378.470335] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3378.471098] RIP: 0010:vprintk_store+0x17f/0xa20 [ 3378.471841] Code: e8 86 97 1f 00 41 80 fd 03 0f 86 ce 00 00 00 e8 a7 9c 1f 00 48 89 ee 31 ff 45 31 e4 e8 fa 97 1f 00 48 85 ed 0f 85 6e 04 00 00 8c 9c 1f 00 48 b8 00 00 00 00 00 fc ff df 48 03 44 24 08 48 c7 [ 3378.474446] RSP: 0018:ffff88803c1774c0 EFLAGS: 00000202 [ 3378.475252] RAX: 00000000000001d3 RBX: ffff88806ce24025 RCX: 0000000000000040 [ 3378.476315] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff81545e97 [ 3378.477365] RBP: 0000000000000200 R08: 0000000000000001 R09: 0000000000000001 [ 3378.478412] R10: ffffffff8643b457 R11: 0000000000000001 R12: 0000000000000030 [ 3378.479456] R13: ffffffff85bd84e0 R14: 0000000000000000 R15: 0000000000000002 [ 3378.480521] ? vprintk_store+0x5f7/0xa20 [ 3378.481172] ? __pfx_vprintk_store+0x10/0x10 [ 3378.481855] ? find_held_lock+0x2b/0x80 [ 3378.482482] ? kernfs_add_one+0x14b/0x830 [ 3378.483105] ? make_vfsgid+0xf7/0x150 [ 3378.483716] ? __pfx_make_vfsgid+0x10/0x10 [ 3378.484376] ? is_printk_cpu_sync_owner+0x32/0x40 [ 3378.485093] vprintk_emit+0x143/0x630 [ 3378.485703] ? __pfx_vprintk_emit+0x10/0x10 [ 3378.486392] _printk+0xbe/0xf0 [ 3378.486884] ? __pfx__printk+0x10/0x10 [ 3378.487496] ? find_held_lock+0x2b/0x80 [ 3378.488118] ? set_capacity_and_notify+0xce/0x240 [ 3378.488857] ? lock_release+0xc8/0x290 [ 3378.489473] set_capacity_and_notify+0x16a/0x240 [ 3378.490197] ? __pfx_set_capacity_and_notify+0x10/0x10 [ 3378.490969] ? lock_is_held_type+0x9e/0x120 [ 3378.491660] loop_configure+0xcb9/0x1590 [ 3378.492343] ? __pfx_loop_configure+0x10/0x10 [ 3378.493044] ? avc_has_extended_perms+0x107/0xf20 [ 3378.493804] ? find_held_lock+0x2b/0x80 [ 3378.494425] ? avc_has_extended_perms+0x23b/0xf20 [ 3378.495183] ? lock_release+0xc8/0x290 [ 3378.495774] lo_ioctl+0x66d/0x1c70 [ 3378.496347] ? __pfx_lo_ioctl+0x10/0x10 [ 3378.496941] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3378.497739] ? lock_acquire+0x15e/0x2f0 [ 3378.498372] ? __virt_addr_valid+0x1c6/0x5d0 [ 3378.499054] ? find_held_lock+0x2b/0x80 [ 3378.499692] ? __virt_addr_valid+0x2e8/0x5d0 [ 3378.500390] ? lock_release+0xc8/0x290 [ 3378.500978] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 3378.501797] ? percpu_is_read_locked+0x100/0x1d0 [ 3378.502527] ? __fget_files+0x34/0x3b0 [ 3378.503118] ? find_held_lock+0x2b/0x80 [ 3378.503749] ? __fget_files+0x203/0x3b0 [ 3378.504368] ? __pfx_lo_ioctl+0x10/0x10 [ 3378.504980] blkdev_ioctl+0x27c/0x6c0 [ 3378.505569] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3378.506240] ? selinux_file_ioctl+0xb9/0x280 [ 3378.506903] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3378.507578] __x64_sys_ioctl+0x18f/0x210 [ 3378.508228] do_syscall_64+0xbf/0x360 [ 3378.508795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3378.509569] RIP: 0033:0x7f8e602738d7 [ 3378.510124] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3378.512808] RSP: 002b:00007f8e5d7e8f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3378.513941] RAX: ffffffffffffffda RBX: 00007f8e602bd970 RCX: 00007f8e602738d7 [ 3378.515012] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 3378.516086] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 3378.517160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 3378.518221] R13: 0000000000000005 R14: 00000000200016b8 R15: 0000000000000005 [ 3378.519316] [ 3378.519681] irq event stamp: 1410 [ 3378.520210] hardirqs last enabled at (1420): [] __up_console_sem+0x78/0x80 [ 3378.521481] hardirqs last disabled at (1429): [] __up_console_sem+0x5d/0x80 [ 3378.522755] softirqs last enabled at (0): [] copy_process+0x1e58/0x73c0 [ 3378.523984] softirqs last disabled at (469): [] __irq_exit_rcu+0xc4/0x100 [ 3378.525243] ---[ end trace 0000000000000000 ]--- [ 3378.525933] percpu_ref_switch_to_atomic_rcu: percpu_ref_switch_to_atomic_rcu(): percpu_ref underflow slab kmalloc-64 start ffff88800db60980 pointer offset 0 size 64 [ 3378.533837] FAT-fs (loop6): unable to read boot sector 16:11:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0) 16:11:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0)) 16:11:50 executing program 7: io_uring_setup(0x3a2f, 0x0) [ 3378.637947] msdos: Unknown parameter 'audit' 16:11:50 executing program 0: syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000280)) [ 3378.673059] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3378.675216] FAT-fs (loop2): unable to read boot sector VM DIAGNOSIS: 16:11:50 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff828e5070 RDI=ffffffff88729280 RBP=ffffffff88729240 RSP=ffff88806ce08718 R8 =0000000000000000 R9 =ffffed1001490046 R10=00000000000fe503 R11=0000000000000001 R12=0000000000000823 R13=0000000000000020 R14=fffffbfff10e52a2 R15=dffffc0000000000 RIP=ffffffff828e50c5 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8e5d7e9700 00000000 00000000 GS =0000 ffff8880e55d8000 00000000 00000000 LDT=0000 fffffe7c00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fcfbfc9d018 CR3=000000000f673000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=ffffffffffffffffffffffffffffffff XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffed100d9e501d RBX=0000000000000000 RCX=ffffffff8161ace8 RDX=ffff888015511b80 RSI=ffffffff8161ad3a RDI=0000000000000005 RBP=0000000000000004 RSP=ffff88806cf08e98 R8 =0000000000000000 R9 =fffffbfff0c8768a R10=0000000000000010 R11=0000000000000001 R12=ffff88806cf28080 R13=ffff88806cf28300 R14=7fffffffffffffff R15=dffffc0000000000 RIP=ffffffff8173f6b8 RFL=00000086 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f815a0e3900 00000000 00000000 GS =0000 ffff8880e56d8000 00000000 00000000 LDT=0000 fffffe1600000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f815955c030 CR3=0000000009f0a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=30306234386136303638616663356134 XMM02=38303062343861363036386166633561 XMM03=2f6c616e72756f6a2f676f6c2f6e7572 XMM04=e07791d575faa6dd000000000041b1c0 XMM05=d3fdd5f48436fbd700000000000aead0 XMM06=cd6e809af35945b500000000000ae988 XMM07=00000000000000000000000000000000 XMM08=44495f474f4c5359530069253d595449 XMM09=00000000000000000000000000000000 XMM10=00000020000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000