ormal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:00:33 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:00:33 executing program 4:
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:00:33 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
socket$inet_tcp(0x2, 0x1, 0x0)
16:00:33 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:00:33 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:00:33 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:00:33 executing program 0:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2701.497096] loop3: detected capacity change from 0 to 131072
[ 2701.512712] loop6: detected capacity change from 0 to 131072
16:00:33 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
[ 2701.547903] loop1: detected capacity change from 0 to 131072
[ 2701.553115] loop0: detected capacity change from 0 to 131072
[ 2701.556136] loop5: detected capacity change from 0 to 131072
16:00:33 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2701.565211] msdos: Unknown parameter 'audit'
16:00:33 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:00:33 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
[ 2701.610680] loop3: detected capacity change from 0 to 131072
16:00:33 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:00:33 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:00:33 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2701.737513] loop3: detected capacity change from 0 to 131072
[ 2701.769768] loop6: detected capacity change from 0 to 131072
16:00:42 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:00:42 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:00:42 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:00:42 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:00:42 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c", 0x64, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:00:42 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:00:42 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
socket$inet_tcp(0x2, 0x1, 0x0)
16:00:42 executing program 0:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2710.802640] loop3: detected capacity change from 0 to 131072
[ 2710.814848] loop0: detected capacity change from 0 to 131072
16:00:42 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2710.854693] loop5: detected capacity change from 0 to 131072
[ 2710.865886] loop6: detected capacity change from 0 to 131072
[ 2710.867332] loop1: detected capacity change from 0 to 131072
[ 2710.868401] msdos: Unknown parameter 'audit'
[ 2710.876742] msdos: Unknown parameter 'audit'
16:00:42 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:00:42 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:00:42 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:00:42 executing program 2:
delete_module(0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
16:00:42 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:00:42 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c", 0x64, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2710.992298] loop0: detected capacity change from 0 to 131072
16:00:42 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:00:42 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:00:42 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:00:42 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2711.096095] loop5: detected capacity change from 0 to 131072
[ 2711.101647] loop3: detected capacity change from 0 to 131072
[ 2711.105161] msdos: Unknown parameter 'audit'
16:00:42 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2711.127139] loop1: detected capacity change from 0 to 131072
16:00:42 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
[ 2711.173106] loop6: detected capacity change from 0 to 131072
[ 2711.209571] loop0: detected capacity change from 0 to 131072
16:00:51 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:00:51 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:00:51 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:00:51 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c", 0x64, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:00:51 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:00:51 executing program 2:
socket$inet_tcp(0x2, 0x1, 0x0)
16:00:51 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:00:51 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:00:51 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
syz_open_dev$vcsn(0x0, 0x1ff, 0x10001)
[ 2719.574546] loop3: detected capacity change from 0 to 131072
[ 2719.582381] loop0: detected capacity change from 0 to 131072
16:00:51 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2719.594248] loop6: detected capacity change from 0 to 131072
[ 2719.597440] loop1: detected capacity change from 0 to 131072
[ 2719.605913] loop5: detected capacity change from 0 to 131072
[ 2719.613965] msdos: Unknown parameter 'audit'
16:00:51 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:00:51 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:00:51 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x10001)
16:00:51 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c", 0x64, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2719.732726] loop6: detected capacity change from 0 to 131072
[ 2719.734155] msdos: Unknown parameter 'audit'
[ 2719.766516] loop1: detected capacity change from 0 to 131072
[ 2719.785023] loop5: detected capacity change from 0 to 131072
[ 2719.788885] msdos: Unknown parameter 'audit'
16:01:00 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:00 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:00 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:00 executing program 2:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:00 executing program 4:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
16:01:00 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:00 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:00 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2729.030561] loop3: detected capacity change from 0 to 131072
[ 2729.032841] loop0: detected capacity change from 0 to 131072
[ 2729.037543] loop5: detected capacity change from 0 to 131072
16:01:00 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:00 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2729.068860] msdos: Unknown parameter 'audit'
[ 2729.083098] loop6: detected capacity change from 0 to 131072
16:01:00 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2729.150968] loop0: detected capacity change from 0 to 131072
16:01:00 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:00 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:00 executing program 2:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:00 executing program 5:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
[ 2729.194960] loop3: detected capacity change from 0 to 131072
[ 2729.253793] loop5: detected capacity change from 0 to 131072
[ 2729.258825] loop6: detected capacity change from 0 to 131072
16:01:10 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:10 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:10 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:10 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:10 executing program 2:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:10 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:10 executing program 5:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:10 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2738.863380] loop0: detected capacity change from 0 to 131072
[ 2738.879074] loop3: detected capacity change from 0 to 131072
16:01:10 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2738.899852] loop5: detected capacity change from 0 to 131072
16:01:10 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2738.919544] loop6: detected capacity change from 0 to 131072
[ 2738.941066] loop4: detected capacity change from 0 to 131072
[ 2738.962567] loop0: detected capacity change from 0 to 131072
16:01:10 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:10 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:10 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:10 executing program 5:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:10 executing program 2:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2739.034067] loop6: detected capacity change from 0 to 131072
16:01:10 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2739.064454] loop0: detected capacity change from 0 to 131072
[ 2739.079566] loop3: detected capacity change from 0 to 131072
[ 2739.136795] loop5: detected capacity change from 0 to 131072
16:01:19 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:19 executing program 2:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
16:01:19 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:19 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:19 executing program 4:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:19 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:19 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:19 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2747.644321] loop3: detected capacity change from 0 to 131072
16:01:19 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2747.689773] loop0: detected capacity change from 0 to 131072
16:01:19 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2747.707600] loop5: detected capacity change from 0 to 131072
16:01:19 executing program 2:
syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
[ 2747.720089] loop6: detected capacity change from 0 to 131072
16:01:19 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2747.770874] loop3: detected capacity change from 0 to 131072
16:01:19 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:19 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2747.824827] loop0: detected capacity change from 0 to 131072
16:01:19 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:19 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:01:19 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:19 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:19 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2747.904618] loop6: detected capacity change from 0 to 131072
[ 2747.908339] loop3: detected capacity change from 0 to 131072
[ 2747.908678] loop5: detected capacity change from 0 to 131072
[ 2747.939970] loop0: detected capacity change from 0 to 131072
[ 2747.977906] loop4: detected capacity change from 0 to 131072
[ 2747.983832] msdos: Unknown parameter 'audit'
16:01:27 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:27 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:27 executing program 2:
syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
16:01:27 executing program 1:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:27 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:27 executing program 0:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:27 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:27 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2756.127060] loop3: detected capacity change from 0 to 131072
[ 2756.129689] loop0: detected capacity change from 0 to 131072
16:01:27 executing program 1:
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2756.164827] loop4: detected capacity change from 0 to 131072
16:01:27 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:27 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2756.191865] loop6: detected capacity change from 0 to 131072
16:01:27 executing program 2:
syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
[ 2756.231505] loop0: detected capacity change from 0 to 131072
[ 2756.232696] loop3: detected capacity change from 0 to 131072
16:01:27 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:36 executing program 2:
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
16:01:36 executing program 1:
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:36 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
16:01:36 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:36 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:36 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:01:36 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:36 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2764.939315] loop6: detected capacity change from 0 to 131072
[ 2764.948976] loop3: detected capacity change from 0 to 131072
[ 2764.956125] loop4: detected capacity change from 0 to 131072
[ 2764.963311] msdos: Unknown parameter 'audit'
16:01:36 executing program 2:
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
16:01:36 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
16:01:36 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:36 executing program 6:
delete_module(0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:36 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:01:36 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:36 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:36 executing program 1:
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2765.072618] loop3: detected capacity change from 0 to 131072
16:01:36 executing program 2:
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
[ 2765.097096] loop4: detected capacity change from 0 to 131072
[ 2765.103589] msdos: Unknown parameter 'audit'
[ 2765.105077] loop5: detected capacity change from 0 to 131072
16:01:36 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:36 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
[ 2765.176791] loop6: detected capacity change from 0 to 131072
[ 2765.190725] loop3: detected capacity change from 0 to 131072
16:01:44 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:44 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:44 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:44 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c3", 0x18, 0x4}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
16:01:44 executing program 1:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:44 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:01:44 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
16:01:44 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2773.141979] loop3: detected capacity change from 0 to 131072
[ 2773.149108] loop4: detected capacity change from 0 to 131072
[ 2773.153832] msdos: Unknown parameter 'audit'
[ 2773.190543] loop2: detected capacity change from 0 to 131072
16:01:44 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2773.199952] msdos: Unknown parameter 'audit'
16:01:44 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
16:01:44 executing program 1:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:44 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:44 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:01:45 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:45 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@appraise}]})
[ 2773.269079] loop0: detected capacity change from 0 to 131072
[ 2773.300306] loop4: detected capacity change from 0 to 131072
[ 2773.305387] msdos: Unknown parameter 'audit'
16:01:53 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:01:53 executing program 1:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:53 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
16:01:53 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:53 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0)
16:01:53 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:53 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:53 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2782.186217] loop4: detected capacity change from 0 to 131072
[ 2782.191475] loop0: detected capacity change from 0 to 131072
[ 2782.192921] msdos: Unknown parameter 'audit'
[ 2782.196878] loop3: detected capacity change from 0 to 131072
16:01:53 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0)
[ 2782.228904] loop2: detected capacity change from 0 to 131072
16:01:53 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:53 executing program 1:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2782.249835] msdos: Unknown parameter 'audit'
16:01:54 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:54 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
16:01:54 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:01:54 executing program 1:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:01:54 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2782.319916] loop0: detected capacity change from 0 to 131072
[ 2782.320333] loop3: detected capacity change from 0 to 131072
[ 2782.328949] loop4: detected capacity change from 0 to 131072
[ 2782.336278] msdos: Unknown parameter 'audit'
16:01:54 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2782.346806] loop6: detected capacity change from 0 to 131072
[ 2782.398891] loop2: detected capacity change from 0 to 131072
[ 2782.401614] msdos: Unknown parameter 'audit'
16:02:02 executing program 1:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, 0x0, 0x0)
16:02:02 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0)
16:02:02 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:02 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
16:02:02 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:02 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
16:02:02 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:02 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2791.185640] loop6: detected capacity change from 0 to 131072
[ 2791.190066] loop3: detected capacity change from 0 to 131072
[ 2791.209918] loop2: detected capacity change from 0 to 131072
[ 2791.216368] loop0: detected capacity change from 0 to 131072
[ 2791.217890] loop4: detected capacity change from 0 to 131072
[ 2791.222136] msdos: Unknown parameter 'audit'
[ 2791.239551] msdos: Unknown parameter 'audit'
16:02:03 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
[ 2791.300129] loop3: detected capacity change from 0 to 131072
16:02:12 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
16:02:12 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:12 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:02:12 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@appraise}]})
[ 2800.749684] loop0: detected capacity change from 0 to 131072
16:02:12 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}], [{@audit}, {@appraise}]})
[ 2800.782520] loop6: detected capacity change from 0 to 131072
[ 2800.806693] loop2: detected capacity change from 0 to 131072
[ 2800.809116] loop1: detected capacity change from 0 to 131072
[ 2800.814468] loop3: detected capacity change from 0 to 131072
[ 2800.819565] msdos: Unknown parameter 'audit'
[ 2800.825555] loop4: detected capacity change from 0 to 131072
[ 2800.838420] msdos: Unknown parameter 'audit'
[ 2800.843926] loop0: detected capacity change from 0 to 131072
16:02:12 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:12 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:02:12 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
16:02:12 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2800.934138] loop6: detected capacity change from 0 to 131072
[ 2800.974359] loop0: detected capacity change from 0 to 131072
16:02:12 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:12 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}], [{@audit}, {@appraise}]})
16:02:12 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2801.010521] loop3: detected capacity change from 0 to 131072
[ 2801.023950] loop2: detected capacity change from 0 to 131072
[ 2801.033233] msdos: Unknown parameter 'audit'
16:02:12 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2801.052419] loop1: detected capacity change from 0 to 131072
[ 2801.060997] loop6: detected capacity change from 0 to 131072
[ 2801.079076] loop4: detected capacity change from 0 to 131072
[ 2801.087705] loop0: detected capacity change from 0 to 131072
16:02:12 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:12 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2801.113564] msdos: Unknown parameter 'audit'
16:02:12 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2801.161949] loop6: detected capacity change from 0 to 131072
[ 2801.219729] loop3: detected capacity change from 0 to 131072
16:02:23 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:23 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:23 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
16:02:23 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:23 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}], [{@audit}, {@appraise}]})
16:02:23 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:23 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:23 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2811.298805] loop2: detected capacity change from 0 to 131072
[ 2811.303467] msdos: Unknown parameter 'audit'
16:02:23 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2811.325505] loop3: detected capacity change from 0 to 131072
[ 2811.342627] loop0: detected capacity change from 0 to 131072
[ 2811.344923] loop6: detected capacity change from 0 to 131072
[ 2811.345708] loop2: detected capacity change from 0 to 131072
[ 2811.353472] msdos: Unknown parameter 'audit'
[ 2811.362431] loop4: detected capacity change from 0 to 131072
[ 2811.369862] loop1: detected capacity change from 0 to 131072
[ 2811.387570] msdos: Unknown parameter 'audit'
16:02:23 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:23 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:23 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:23 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:23 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}], [{@audit}, {@appraise}]})
[ 2811.536510] loop0: detected capacity change from 0 to 131072
[ 2811.561352] loop3: detected capacity change from 0 to 131072
[ 2811.566722] loop2: detected capacity change from 0 to 131072
[ 2811.574586] msdos: Unknown parameter 'audit'
16:02:32 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:32 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:32 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e", 0x66, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:32 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:32 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:02:32 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@appraise}]})
16:02:32 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:33 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2821.274504] loop3: detected capacity change from 0 to 131072
[ 2821.276022] loop2: detected capacity change from 0 to 131072
[ 2821.277294] loop1: detected capacity change from 0 to 131072
[ 2821.283276] msdos: Unknown parameter 'audit'
[ 2821.318783] loop0: detected capacity change from 0 to 131072
[ 2821.319612] loop4: detected capacity change from 0 to 131072
[ 2821.320959] loop6: detected capacity change from 0 to 131072
[ 2821.327742] msdos: Unknown parameter 'audit'
16:02:33 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:33 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:33 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:33 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:33 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:33 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:33 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}]})
[ 2821.419371] loop2: detected capacity change from 0 to 131072
[ 2821.422921] msdos: Unknown parameter 'audit'
16:02:33 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2821.439083] loop1: detected capacity change from 0 to 131072
16:02:33 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:33 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:33 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2821.525554] loop2: detected capacity change from 0 to 131072
[ 2821.533111] msdos: Unknown parameter 'audit'
[ 2821.554588] loop0: detected capacity change from 0 to 131072
[ 2821.555336] loop1: detected capacity change from 0 to 131072
[ 2821.555970] loop4: detected capacity change from 0 to 131072
[ 2821.557455] loop6: detected capacity change from 0 to 131072
[ 2821.563005] msdos: Unknown parameter 'audit'
16:02:42 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:42 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:42 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:42 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:42 executing program 5:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0))
16:02:42 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:42 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:42 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2831.262062] loop2: detected capacity change from 0 to 131072
[ 2831.265351] msdos: Unknown parameter 'audit'
16:02:43 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2831.313399] loop1: detected capacity change from 0 to 131072
[ 2831.323694] loop4: detected capacity change from 0 to 131072
[ 2831.329302] msdos: Unknown parameter 'audit'
[ 2831.332024] loop0: detected capacity change from 0 to 131072
[ 2831.333509] loop6: detected capacity change from 0 to 131072
[ 2831.346380] loop3: detected capacity change from 0 to 131072
16:02:51 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:02:51 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 5:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2839.823860] loop1: detected capacity change from 0 to 131072
[ 2839.827000] loop2: detected capacity change from 0 to 131072
[ 2839.829954] msdos: Unknown parameter 'audit'
[ 2839.833713] loop5: detected capacity change from 0 to 131072
[ 2839.837557] loop4: detected capacity change from 0 to 131072
[ 2839.841573] msdos: Unknown parameter 'audit'
[ 2839.857928] loop3: detected capacity change from 0 to 131072
[ 2839.861462] loop0: detected capacity change from 0 to 131072
16:02:51 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 5:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2839.945634] loop5: detected capacity change from 0 to 131072
[ 2839.949087] loop2: detected capacity change from 0 to 131072
16:02:51 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2839.956685] msdos: Unknown parameter 'audit'
[ 2839.962817] loop1: detected capacity change from 0 to 131072
[ 2839.982221] loop4: detected capacity change from 0 to 131072
16:02:51 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52", 0x33, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 5:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2840.008548] msdos: Unknown parameter 'audit'
16:02:51 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2840.061733] loop5: detected capacity change from 0 to 131072
[ 2840.072748] loop0: detected capacity change from 0 to 131072
16:02:51 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:02:51 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2840.090825] loop2: detected capacity change from 0 to 131072
[ 2840.099359] msdos: Unknown parameter 'audit'
[ 2840.117529] loop4: detected capacity change from 0 to 131072
16:03:01 executing program 5:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:03:01 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2849.771454] loop2: detected capacity change from 0 to 131072
[ 2849.772364] loop1: detected capacity change from 0 to 131072
[ 2849.776462] msdos: Unknown parameter 'audit'
[ 2849.778039] loop0: detected capacity change from 0 to 131072
[ 2849.786042] loop4: detected capacity change from 0 to 131072
[ 2849.787690] loop3: detected capacity change from 0 to 131072
16:03:01 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:03:01 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2849.884822] loop2: detected capacity change from 0 to 131072
[ 2849.886825] loop1: detected capacity change from 0 to 131072
[ 2849.887673] msdos: Unknown parameter 'audit'
[ 2849.898686] loop6: detected capacity change from 0 to 131072
16:03:01 executing program 5:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:01 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2849.986390] loop0: detected capacity change from 0 to 131072
[ 2850.006358] loop4: detected capacity change from 0 to 131072
16:03:11 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 1:
delete_module(0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:03:11 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:03:11 executing program 5:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 2859.731130] loop0: detected capacity change from 0 to 131072
[ 2859.737066] loop1: detected capacity change from 0 to 131072
[ 2859.746325] loop2: detected capacity change from 0 to 131072
[ 2859.754140] msdos: Unknown parameter 'audit'
[ 2859.754714] loop4: detected capacity change from 0 to 131072
[ 2859.766225] loop3: detected capacity change from 0 to 131072
16:03:11 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d424", 0x1a, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:03:11 executing program 1:
delete_module(0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2859.900064] loop1: detected capacity change from 0 to 131072
[ 2859.900139] loop0: detected capacity change from 0 to 131072
[ 2859.924618] loop2: detected capacity change from 0 to 131072
[ 2859.929529] msdos: Unknown parameter 'audit'
[ 2859.964982] loop4: detected capacity change from 0 to 131072
16:03:11 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2860.005061] loop3: detected capacity change from 0 to 131072
[ 2860.007769] loop1: detected capacity change from 0 to 131072
[ 2860.060952] loop2: detected capacity change from 0 to 131072
[ 2860.066514] msdos: Unknown parameter 'audit'
16:03:11 executing program 1:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:11 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:03:20 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6", 0x1, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2868.911610] loop2: detected capacity change from 0 to 131072
[ 2868.918698] loop1: detected capacity change from 0 to 131072
[ 2868.922989] msdos: Unknown parameter 'audit'
[ 2868.945331] loop6: detected capacity change from 0 to 131072
[ 2868.949579] loop0: detected capacity change from 0 to 131072
[ 2868.972381] loop3: detected capacity change from 0 to 131072
[ 2868.991770] loop5: detected capacity change from 0 to 131072
[ 2869.010633] msdos: Unknown parameter 'audit'
16:03:20 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:20 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2869.117579] loop1: detected capacity change from 0 to 131072
[ 2869.159460] loop2: detected capacity change from 0 to 131072
[ 2869.173666] msdos: Unknown parameter 'audit'
16:03:28 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:03:28 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:28 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:28 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36", 0x30, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:03:28 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:28 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:03:28 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:28 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2876.282360] loop0: detected capacity change from 0 to 131072
16:03:28 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:28 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2876.332521] loop2: detected capacity change from 0 to 131072
[ 2876.341437] loop6: detected capacity change from 0 to 131072
[ 2876.352382] msdos: Unknown parameter 'audit'
[ 2876.375010] loop5: detected capacity change from 0 to 131072
[ 2876.380286] loop3: detected capacity change from 0 to 131072
[ 2876.400132] msdos: Unknown parameter 'audit'
[ 2876.401789] msdos: Unknown parameter 'audit'
16:03:28 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:28 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:28 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:28 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2876.470000] loop2: detected capacity change from 0 to 131072
[ 2876.477675] msdos: Unknown parameter 'audit'
16:03:28 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2876.504146] loop4: detected capacity change from 0 to 131072
16:03:28 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2876.567573] loop6: detected capacity change from 0 to 131072
[ 2876.606915] loop3: detected capacity change from 0 to 131072
16:03:36 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:03:36 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:03:37 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
16:03:37 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2885.294054] loop6: detected capacity change from 0 to 131072
[ 2885.296683] loop0: detected capacity change from 0 to 131072
[ 2885.298013] loop1: detected capacity change from 0 to 131072
[ 2885.307865] loop4: detected capacity change from 0 to 131072
[ 2885.316080] loop2: detected capacity change from 0 to 131072
[ 2885.322358] loop5: detected capacity change from 0 to 131072
[ 2885.324775] loop3: detected capacity change from 0 to 131072
[ 2885.333458] msdos: Unknown parameter 'audit'
[ 2885.337511] msdos: Unknown parameter 'audit'
16:03:37 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2885.445031] loop1: detected capacity change from 0 to 131072
[ 2885.451383] loop0: detected capacity change from 0 to 131072
16:03:37 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e", 0xe2, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:03:37 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2885.475023] loop6: detected capacity change from 0 to 131072
16:03:37 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:03:37 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2885.546125] loop2: detected capacity change from 0 to 131072
[ 2885.554630] msdos: Unknown parameter 'audit'
16:03:37 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {0x0, 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:37 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1})
[ 2885.588920] loop3: detected capacity change from 0 to 131072
[ 2885.604419] loop5: detected capacity change from 0 to 131072
[ 2885.608813] loop1: detected capacity change from 0 to 131072
[ 2885.650788] loop6: detected capacity change from 0 to 131072
16:03:44 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:44 executing program 3:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d9414", 0xc7, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:03:44 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:44 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:03:44 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:44 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:44 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, 0x0)
16:03:44 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2892.922220] loop6: detected capacity change from 0 to 131072
[ 2892.930856] loop2: detected capacity change from 0 to 131072
[ 2892.932778] loop5: detected capacity change from 0 to 131072
[ 2892.946438] msdos: Unknown parameter 'audit'
[ 2892.948502] msdos: Unknown parameter 'audit'
16:03:44 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2892.975214] loop1: detected capacity change from 0 to 131072
[ 2892.977620] loop3: detected capacity change from 0 to 131072
[ 2892.979074] msdos: Unknown parameter 'audit'
16:03:44 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:44 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, 0x0)
[ 2893.020816] loop6: detected capacity change from 0 to 131072
16:03:44 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:44 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2893.140046] loop2: detected capacity change from 0 to 131072
[ 2893.143955] msdos: Unknown parameter 'audit'
16:03:53 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, 0x0)
16:03:53 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 5:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49", 0xdc, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2902.058452] loop0: detected capacity change from 0 to 131072
[ 2902.061035] loop1: detected capacity change from 0 to 131072
[ 2902.073996] loop2: detected capacity change from 0 to 131072
[ 2902.082632] loop6: detected capacity change from 0 to 131072
[ 2902.086875] loop3: detected capacity change from 0 to 131072
[ 2902.088871] msdos: Unknown parameter 'audit'
[ 2902.092206] loop5: detected capacity change from 0 to 131072
16:03:53 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x10, 0x1})
16:03:53 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2902.160753] loop0: detected capacity change from 0 to 131072
[ 2902.163119] loop1: detected capacity change from 0 to 131072
16:03:53 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:53 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2902.271055] loop6: detected capacity change from 0 to 131072
16:03:54 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x10, 0x1})
16:03:54 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:54 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:54 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2902.314576] loop2: detected capacity change from 0 to 131072
[ 2902.319555] loop1: detected capacity change from 0 to 131072
[ 2902.323116] msdos: Unknown parameter 'audit'
16:03:54 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:03:54 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0)
[ 2902.343627] loop0: detected capacity change from 0 to 131072
[ 2902.344726] loop3: detected capacity change from 0 to 131072
[ 2902.366408] loop5: detected capacity change from 0 to 131072
16:03:54 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2902.375466] loop6: detected capacity change from 0 to 131072
16:03:54 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x10, 0x1})
[ 2902.419061] loop1: detected capacity change from 0 to 131072
16:04:03 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x0, 0x1})
16:04:03 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:04:03 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:03 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0)
16:04:03 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:03 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:04:03 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:03 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2911.602998] loop2: detected capacity change from 0 to 131072
[ 2911.606667] msdos: Unknown parameter 'audit'
[ 2911.608749] loop3: detected capacity change from 0 to 131072
[ 2911.612953] msdos: Unknown parameter 'audit'
[ 2911.638376] loop0: detected capacity change from 0 to 131072
[ 2911.650377] loop5: detected capacity change from 0 to 131072
16:04:03 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2911.660915] loop1: detected capacity change from 0 to 131072
[ 2911.664769] loop6: detected capacity change from 0 to 131072
16:04:03 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031", 0x72, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2911.715090] loop2: detected capacity change from 0 to 131072
[ 2911.723078] loop3: detected capacity change from 0 to 131072
16:04:03 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x0, 0x1})
[ 2911.725335] msdos: Unknown parameter 'audit'
16:04:14 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:04:14 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x0, 0x1})
16:04:14 executing program 3:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:04:14 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0)
16:04:14 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2922.863664] loop1: detected capacity change from 0 to 131072
[ 2922.868109] loop0: detected capacity change from 0 to 131072
[ 2922.881525] loop5: detected capacity change from 0 to 131072
[ 2922.883377] loop3: detected capacity change from 0 to 131072
[ 2922.892625] msdos: Unknown parameter 'audit'
[ 2922.899493] loop6: detected capacity change from 0 to 131072
[ 2922.904878] loop2: detected capacity change from 0 to 131072
16:04:14 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600)='K', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e", 0x66, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:14 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10})
16:04:14 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2923.084732] loop0: detected capacity change from 0 to 131072
[ 2923.111415] loop1: detected capacity change from 0 to 131072
[ 2923.111571] loop5: detected capacity change from 0 to 131072
[ 2923.119098] loop6: detected capacity change from 0 to 131072
[ 2923.138236] loop3: detected capacity change from 0 to 131072
[ 2923.139960] loop2: detected capacity change from 0 to 131072
16:04:25 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10})
16:04:25 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:04:25 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
[ 2933.323873] loop0: detected capacity change from 0 to 131072
[ 2933.330580] loop3: detected capacity change from 0 to 131072
[ 2933.353102] loop2: detected capacity change from 0 to 131072
[ 2933.355086] loop6: detected capacity change from 0 to 131072
[ 2933.355855] loop1: detected capacity change from 0 to 131072
16:04:25 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
16:04:25 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:25 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:04:25 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2933.545463] loop0: detected capacity change from 0 to 131072
[ 2933.556064] loop6: detected capacity change from 0 to 131072
16:04:25 executing program 7:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c68727309", 0x2e, 0x4}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10})
[ 2933.595312] loop2: detected capacity change from 0 to 131072
[ 2933.635792] loop3: detected capacity change from 0 to 131072
16:04:25 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
16:04:25 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2933.646010] loop1: detected capacity change from 0 to 131072
[ 2933.756719] loop6: detected capacity change from 0 to 131072
16:04:35 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:35 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:35 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:35 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:35 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
16:04:35 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc", 0x8c, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:04:35 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:35 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)='Ku', 0x2, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2943.360804] loop0: detected capacity change from 0 to 131072
[ 2943.387280] loop7: detected capacity change from 0 to 131072
[ 2943.404863] loop1: detected capacity change from 0 to 131072
[ 2943.421949] loop3: detected capacity change from 0 to 131072
[ 2943.424746] loop6: detected capacity change from 0 to 131072
[ 2943.434848] msdos: Unknown parameter 'audit'
16:04:35 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
16:04:35 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2943.464242] loop2: detected capacity change from 0 to 131072
[ 2943.568815] loop0: detected capacity change from 0 to 131072
16:04:45 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:45 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:04:45 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:45 executing program 5:
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
16:04:45 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:45 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:45 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:04:45 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52", 0x33, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2953.482928] loop7: detected capacity change from 0 to 131072
[ 2953.515093] loop0: detected capacity change from 0 to 131072
[ 2953.543716] loop1: detected capacity change from 0 to 131072
[ 2953.547296] loop3: detected capacity change from 0 to 131072
[ 2953.549763] loop6: detected capacity change from 0 to 131072
16:04:45 executing program 7:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565", 0xc, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:04:45 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
16:04:45 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:45 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 2953.703955] loop7: detected capacity change from 0 to 131072
[ 2953.707051] msdos: Unknown parameter 'audit'
16:04:45 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:45 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
16:04:45 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:45 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:45 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:04:45 executing program 5:
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
[ 2953.833697] loop1: detected capacity change from 0 to 131072
[ 2953.864524] loop3: detected capacity change from 0 to 131072
[ 2953.871918] loop6: detected capacity change from 0 to 131072
[ 2953.911739] loop7: detected capacity change from 0 to 128
16:04:54 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:54 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}]})
16:04:54 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565", 0xc, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:04:54 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:04:54 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:54 executing program 5:
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
16:04:54 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:54 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2962.805862] loop6: detected capacity change from 0 to 131072
[ 2962.810120] loop1: detected capacity change from 0 to 131072
[ 2962.820579] loop3: detected capacity change from 0 to 131072
[ 2962.820684] loop7: detected capacity change from 0 to 131072
16:04:54 executing program 5:
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
16:04:54 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:54 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:54 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:54 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:04:54 executing program 3:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:04:54 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}]})
16:04:54 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2963.009127] loop6: detected capacity change from 0 to 131072
[ 2963.032909] loop2: detected capacity change from 0 to 131072
[ 2963.052132] loop1: detected capacity change from 0 to 131072
[ 2963.078815] loop7: detected capacity change from 0 to 131072
16:04:54 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2963.093051] loop3: detected capacity change from 0 to 131072
[ 2963.106803] msdos: Unknown parameter 'audit'
16:04:54 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
[ 2963.220597] loop0: detected capacity change from 0 to 131072
16:05:03 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
16:05:03 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:03 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:03 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d424", 0x1a, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:03 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:03 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}]})
16:05:03 executing program 3:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:03 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2971.595821] loop2: detected capacity change from 0 to 131072
[ 2971.608387] loop1: detected capacity change from 0 to 131072
16:05:03 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}]})
[ 2971.639700] loop0: detected capacity change from 0 to 131072
[ 2971.649957] loop3: detected capacity change from 0 to 131072
[ 2971.650032] loop7: detected capacity change from 0 to 131072
[ 2971.652130] loop6: detected capacity change from 0 to 131072
16:05:03 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:03 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
16:05:03 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:03 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[], [{@audit}]})
[ 2971.776809] loop6: detected capacity change from 0 to 131072
16:05:12 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, 0x0)
16:05:12 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0))
16:05:12 executing program 7:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
16:05:12 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:12 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6", 0x1, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:12 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:12 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
16:05:12 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba0", 0x25, 0x4}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2981.221717] loop0: detected capacity change from 0 to 131072
[ 2981.263451] loop1: detected capacity change from 0 to 131072
[ 2981.267752] loop6: detected capacity change from 0 to 131072
[ 2981.282590] loop3: detected capacity change from 0 to 131072
16:05:13 executing program 7:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
16:05:13 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2981.428426] loop0: detected capacity change from 0 to 131072
16:05:13 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:13 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2981.463620] loop1: detected capacity change from 0 to 131072
16:05:13 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, 0x0)
16:05:13 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:13 executing program 7:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
[ 2981.508070] loop6: detected capacity change from 0 to 131072
16:05:13 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:13 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2981.551126] loop3: detected capacity change from 0 to 131072
16:05:13 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:05:13 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2981.606450] loop0: detected capacity change from 0 to 131072
[ 2981.609726] loop1: detected capacity change from 0 to 131072
[ 2981.658764] loop5: detected capacity change from 0 to 131072
[ 2981.677472] msdos: Unknown parameter 'audit'
16:05:22 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0)
16:05:22 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, 0x0)
16:05:22 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:05:22 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:05:22 executing program 7:
syz_open_dev$vcsn(0x0, 0x0, 0x800)
16:05:22 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:22 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:22 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2990.427583] loop5: detected capacity change from 0 to 131072
[ 2990.432292] loop3: detected capacity change from 0 to 131072
[ 2990.438604] loop0: detected capacity change from 0 to 131072
[ 2990.469718] loop4: detected capacity change from 0 to 131072
[ 2990.470920] loop1: detected capacity change from 0 to 131072
[ 2990.471395] loop6: detected capacity change from 0 to 131072
16:05:22 executing program 2:
openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x0)
16:05:22 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2990.486730] FAT-fs (loop4): bogus number of reserved sectors
[ 2990.487674] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 2990.534630] loop5: detected capacity change from 0 to 131072
16:05:22 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2990.540098] msdos: Unknown parameter 'audit'
16:05:22 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:22 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:22 executing program 7:
syz_open_dev$vcsn(0x0, 0x0, 0x800)
16:05:22 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 2990.610788] loop0: detected capacity change from 0 to 131072
[ 2990.650086] loop6: detected capacity change from 0 to 131072
[ 2990.650667] loop1: detected capacity change from 0 to 131072
16:05:31 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:05:31 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 7:
syz_open_dev$vcsn(0x0, 0x0, 0x800)
16:05:31 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:05:31 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 2999.915031] loop0: detected capacity change from 0 to 131072
[ 2999.917102] loop4: detected capacity change from 0 to 131072
[ 2999.926926] loop6: detected capacity change from 0 to 131072
[ 2999.942937] FAT-fs (loop4): bogus number of reserved sectors
[ 2999.944255] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 2999.959873] loop5: detected capacity change from 0 to 131072
[ 2999.971813] loop2: detected capacity change from 0 to 131072
[ 2999.975046] msdos: Unknown parameter 'audit'
16:05:31 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 7:
syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0)
16:05:31 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3000.114106] loop0: detected capacity change from 0 to 131072
[ 3000.133708] loop6: detected capacity change from 0 to 131072
16:05:31 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:05:31 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:31 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3000.194906] loop4: detected capacity change from 0 to 131072
16:05:31 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e", 0x19, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3000.219034] FAT-fs (loop4): bogus number of reserved sectors
[ 3000.220198] FAT-fs (loop4): Can't find a valid FAT filesystem
16:05:31 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3000.266968] loop2: detected capacity change from 0 to 131072
[ 3000.270632] loop5: detected capacity change from 0 to 131072
[ 3000.278497] loop3: detected capacity change from 0 to 131072
[ 3000.307939] loop0: detected capacity change from 0 to 131072
[ 3000.345085] loop6: detected capacity change from 0 to 131072
16:05:40 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:40 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:05:40 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654", 0xc9, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:05:40 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:40 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:40 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:40 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:05:40 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3009.018084] loop1: detected capacity change from 0 to 131072
[ 3009.023138] loop0: detected capacity change from 0 to 131072
[ 3009.023321] loop5: detected capacity change from 0 to 131072
[ 3009.027247] loop2: detected capacity change from 0 to 131072
[ 3009.047323] loop4: detected capacity change from 0 to 131072
[ 3009.053628] loop3: detected capacity change from 0 to 131072
[ 3009.056541] loop6: detected capacity change from 0 to 131072
16:05:40 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3009.081874] loop7: detected capacity change from 0 to 131072
[ 3009.089769] msdos: Unknown parameter 'audit'
[ 3009.150912] loop1: detected capacity change from 0 to 131072
16:05:50 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:50 executing program 5:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130", 0xc6, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:05:50 executing program 7:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:50 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:50 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:05:50 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:50 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:50 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3018.337562] loop7: detected capacity change from 0 to 131072
[ 3018.339342] loop6: detected capacity change from 0 to 131072
[ 3018.380023] loop3: detected capacity change from 0 to 131072
[ 3018.396224] loop4: detected capacity change from 0 to 131072
[ 3018.396513] loop2: detected capacity change from 0 to 131072
[ 3018.399683] loop0: detected capacity change from 0 to 131072
[ 3018.405336] loop5: detected capacity change from 0 to 131072
[ 3018.406343] loop1: detected capacity change from 0 to 131072
16:05:50 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:50 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6e", 0xc0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:05:50 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:50 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:50 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3018.529412] loop6: detected capacity change from 0 to 131072
16:05:50 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:05:50 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:05:50 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654", 0xc9, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3018.605262] loop3: detected capacity change from 0 to 131072
16:05:50 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3018.648134] loop1: detected capacity change from 0 to 131072
16:05:50 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654", 0xc9, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3018.656383] loop4: detected capacity change from 0 to 131072
[ 3018.669989] loop2: detected capacity change from 0 to 131072
16:05:50 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3018.693913] loop0: detected capacity change from 0 to 131072
[ 3018.714652] loop5: detected capacity change from 0 to 131072
[ 3018.731295] msdos: Unknown parameter 'audit'
[ 3018.738655] loop6: detected capacity change from 0 to 131072
16:05:50 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd6", 0xb3, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:05:50 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3018.808313] loop3: detected capacity change from 0 to 131072
[ 3018.882872] loop0: detected capacity change from 0 to 131072
[ 3018.901142] loop2: detected capacity change from 0 to 131072
16:05:59 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:05:59 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:59 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:05:59 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:59 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:05:59 executing program 7:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0)
16:05:59 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654", 0xc9, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:05:59 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {0x0}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3028.154753] loop5: detected capacity change from 0 to 131072
[ 3028.157927] loop2: detected capacity change from 0 to 131072
[ 3028.160651] msdos: Unknown parameter 'audit'
16:05:59 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe", 0x99, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:05:59 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd6", 0xb3, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3028.207707] loop3: detected capacity change from 0 to 131072
[ 3028.213377] loop1: detected capacity change from 0 to 131072
[ 3028.218717] loop4: detected capacity change from 0 to 131072
[ 3028.219843] loop6: detected capacity change from 0 to 131072
[ 3028.221538] loop7: detected capacity change from 0 to 131072
[ 3028.227103] loop0: detected capacity change from 0 to 131072
16:06:00 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:00 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3028.276057] loop5: detected capacity change from 0 to 131072
[ 3028.281081] msdos: Unknown parameter 'audit'
16:06:00 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:00 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3028.302258] loop2: detected capacity change from 0 to 131072
[ 3028.317223] loop1: detected capacity change from 0 to 131072
[ 3028.324016] loop6: detected capacity change from 0 to 131072
16:06:00 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:00 executing program 7:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0)
16:06:00 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3028.354956] loop3: detected capacity change from 0 to 131072
16:06:00 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="40294127106167", 0x7, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:00 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:00 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3028.424600] loop5: detected capacity change from 0 to 131072
[ 3028.431759] msdos: Unknown parameter 'audit'
[ 3028.431964] loop4: detected capacity change from 0 to 131072
[ 3028.433438] loop1: detected capacity change from 0 to 131072
[ 3028.434663] loop0: detected capacity change from 0 to 131072
[ 3028.452325] loop7: detected capacity change from 0 to 131072
[ 3028.456742] loop6: detected capacity change from 0 to 131072
[ 3028.466955] loop3: detected capacity change from 0 to 131072
16:06:09 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:09 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe", 0x99, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:06:09 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:06:09 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:09 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:06:09 executing program 0:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, 0x0)
16:06:09 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:09 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3038.057069] loop6: detected capacity change from 0 to 131072
[ 3038.059785] loop3: detected capacity change from 0 to 131072
[ 3038.066020] loop1: detected capacity change from 0 to 131072
[ 3038.070529] loop5: detected capacity change from 0 to 131072
[ 3038.077708] loop4: detected capacity change from 0 to 131072
[ 3038.080941] loop0: detected capacity change from 0 to 131072
[ 3038.085640] msdos: Unknown parameter 'audit'
[ 3038.093624] loop7: detected capacity change from 0 to 131072
[ 3038.096040] loop2: detected capacity change from 0 to 131072
16:06:09 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:09 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:09 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3038.234790] loop6: detected capacity change from 0 to 131072
[ 3038.240619] loop1: detected capacity change from 0 to 131072
16:06:19 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500), 0x0, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:06:19 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:06:19 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:19 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:06:19 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:19 executing program 0:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:06:19 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:19 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3048.244133] loop7: detected capacity change from 0 to 131072
[ 3048.248262] loop0: detected capacity change from 0 to 131072
[ 3048.252531] msdos: Unknown parameter 'audit'
[ 3048.278485] loop6: detected capacity change from 0 to 131072
[ 3048.289403] loop1: detected capacity change from 0 to 131072
[ 3048.298921] No source specified
[ 3048.302334] loop2: detected capacity change from 0 to 131072
[ 3048.308245] loop5: detected capacity change from 0 to 131072
[ 3048.312112] msdos: Unknown parameter 'audit'
[ 3048.321022] msdos: Unknown parameter 'audit'
16:06:20 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:20 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:20 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:20 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:20 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:06:20 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3048.477742] loop7: detected capacity change from 0 to 131072
[ 3048.483636] loop0: detected capacity change from 0 to 131072
[ 3048.493031] msdos: Unknown parameter 'audit'
[ 3048.496845] loop6: detected capacity change from 0 to 131072
16:06:20 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3048.525417] loop1: detected capacity change from 0 to 131072
[ 3048.567551] No source specified
16:06:20 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3048.598556] loop2: detected capacity change from 0 to 131072
[ 3048.618991] msdos: Unknown parameter 'audit'
[ 3048.657452] kmemleak: Found object by alias at 0x607f1a63e724
[ 3048.657478] CPU: 1 UID: 0 PID: 16642 Comm: syz-executor.4 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
[ 3048.657513] Tainted: [W]=WARN
[ 3048.657519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 3048.657532] Call Trace:
[ 3048.657539]
[ 3048.657548] dump_stack_lvl+0xca/0x120
[ 3048.657590] __lookup_object+0x94/0xb0
[ 3048.657622] delete_object_full+0x27/0x70
[ 3048.657652] free_percpu+0x30/0x1160
[ 3048.657683] ? arch_uprobe_clear_state+0x16/0x140
[ 3048.657720] futex_hash_free+0x38/0xc0
[ 3048.657746] mmput+0x2d3/0x390
[ 3048.657781] do_exit+0x79d/0x2970
[ 3048.657807] ? signal_wake_up_state+0x85/0x120
[ 3048.657836] ? zap_other_threads+0x2b9/0x3a0
[ 3048.657866] ? __pfx_do_exit+0x10/0x10
[ 3048.657891] ? do_group_exit+0x1c3/0x2a0
[ 3048.657917] ? lock_release+0xc8/0x290
[ 3048.657948] do_group_exit+0xd3/0x2a0
[ 3048.657976] __x64_sys_exit_group+0x3e/0x50
[ 3048.658010] x64_sys_call+0x18c5/0x18d0
[ 3048.658040] do_syscall_64+0xbf/0x360
[ 3048.658063] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 3048.658085] RIP: 0033:0x7f63268d6b19
[ 3048.658101] Code: Unable to access opcode bytes at 0x7f63268d6aef.
[ 3048.658111] RSP: 002b:00007ffcc95b0018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 3048.658133] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f63268d6b19
[ 3048.658147] RDX: 00007f632688972b RSI: ffffffffffffffbc RDI: 0000000000000000
[ 3048.658161] RBP: 0000000000000000 R08: 0000001b2cf2001c R09: 0000000000000000
[ 3048.658174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3048.658187] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffcc95b0100
[ 3048.658216]
[ 3048.658223] kmemleak: Object (percpu) 0x607f1a63e720 (size 8):
[ 3048.658236] kmemleak: comm "syz-executor.7", pid 16648, jiffies 4297715568
[ 3048.658249] kmemleak: min_count = 1
[ 3048.658257] kmemleak: count = 0
[ 3048.658264] kmemleak: flags = 0x21
[ 3048.658271] kmemleak: checksum = 0
[ 3048.658278] kmemleak: backtrace:
[ 3048.658284] pcpu_alloc_noprof+0x87a/0x1170
[ 3048.658314] percpu_ref_init+0x37/0x400
[ 3048.658333] io_uring_setup+0x44c/0x2000
[ 3048.658354] __x64_sys_io_uring_setup+0xc8/0x170
[ 3048.658376] do_syscall_64+0xbf/0x360
[ 3048.658394] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 3048.659291] loop7: detected capacity change from 0 to 131072
[ 3048.709571] loop5: detected capacity change from 0 to 131072
[ 3048.712618] msdos: Unknown parameter 'audit'
16:06:30 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:30 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:06:30 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:30 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:30 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:06:30 executing program 2:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)='Ku', 0x2, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:06:30 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:30 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3059.138869] No source specified
[ 3059.143846] loop3: detected capacity change from 0 to 131072
[ 3059.148916] loop0: detected capacity change from 0 to 131072
[ 3059.158575] loop5: detected capacity change from 0 to 131072
[ 3059.163643] loop6: detected capacity change from 0 to 131072
[ 3059.176512] msdos: Unknown parameter 'audit'
[ 3059.177347] loop2: detected capacity change from 0 to 131072
[ 3059.183599] loop7: detected capacity change from 0 to 131072
[ 3059.186239] msdos: Unknown parameter 'audit'
[ 3059.192605] msdos: Unknown parameter 'audit'
16:06:31 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3059.280839] kmemleak: Found object by alias at 0x607f1a63e724
[ 3059.280865] CPU: 1 UID: 0 PID: 16660 Comm: syz-executor.4 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
[ 3059.280892] Tainted: [W]=WARN
[ 3059.280897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 3059.280908] Call Trace:
[ 3059.280914]
[ 3059.280920] dump_stack_lvl+0xca/0x120
[ 3059.280956] __lookup_object+0x94/0xb0
[ 3059.280980] delete_object_full+0x27/0x70
[ 3059.281004] free_percpu+0x30/0x1160
[ 3059.281027] ? arch_uprobe_clear_state+0x16/0x140
[ 3059.281056] futex_hash_free+0x38/0xc0
[ 3059.281077] mmput+0x2d3/0x390
[ 3059.281111] do_exit+0x79d/0x2970
[ 3059.281140] ? signal_wake_up_state+0x85/0x120
[ 3059.281181] ? zap_other_threads+0x2b9/0x3a0
[ 3059.281208] ? __pfx_do_exit+0x10/0x10
[ 3059.281227] ? do_group_exit+0x1c3/0x2a0
[ 3059.281247] ? lock_release+0xc8/0x290
[ 3059.281271] do_group_exit+0xd3/0x2a0
[ 3059.281293] __x64_sys_exit_group+0x3e/0x50
[ 3059.281314] x64_sys_call+0x18c5/0x18d0
[ 3059.281336] do_syscall_64+0xbf/0x360
[ 3059.281354] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 3059.281371] RIP: 0033:0x7f63268d6b19
[ 3059.281384] Code: Unable to access opcode bytes at 0x7f63268d6aef.
[ 3059.281392] RSP: 002b:00007ffcc95b0018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 3059.281408] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f63268d6b19
[ 3059.281419] RDX: 00007f632688972b RSI: ffffffffffffffbc RDI: 0000000000000000
[ 3059.281430] RBP: 0000000000000000 R08: 0000001b2cf2001c R09: 0000000000000000
[ 3059.281440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3059.281450] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffcc95b0100
[ 3059.281472]
[ 3059.281477] kmemleak: Object (percpu) 0x607f1a63e720 (size 8):
[ 3059.281487] kmemleak: comm "syz-executor.2", pid 16671, jiffies 4297726147
[ 3059.281498] kmemleak: min_count = 1
[ 3059.281503] kmemleak: count = 0
[ 3059.281509] kmemleak: flags = 0x21
[ 3059.281514] kmemleak: checksum = 0
[ 3059.281519] kmemleak: backtrace:
[ 3059.281524] pcpu_alloc_noprof+0x87a/0x1170
[ 3059.281547] percpu_ref_init+0x37/0x400
[ 3059.281562] io_uring_setup+0x44c/0x2000
[ 3059.281579] __x64_sys_io_uring_setup+0xc8/0x170
[ 3059.281596] do_syscall_64+0xbf/0x360
[ 3059.281609] entry_SYSCALL_64_after_hwframe+0x77/0x7f
16:06:31 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:31 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:31 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:06:31 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:31 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3059.421892] loop0: detected capacity change from 0 to 131072
[ 3059.422041] loop3: detected capacity change from 0 to 131072
[ 3059.425705] loop6: detected capacity change from 0 to 131072
[ 3059.429682] msdos: Unknown parameter 'audit'
16:06:31 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3059.460345] loop5: detected capacity change from 0 to 131072
16:06:31 executing program 2:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {0x0, 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3059.479586] msdos: Unknown parameter 'audit'
16:06:31 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
[ 3059.572887] FAT-fs (loop4): invalid media value (0xa4)
[ 3059.573839] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 3059.603585] loop2: detected capacity change from 0 to 131072
[ 3059.608502] msdos: Unknown parameter 'audit'
16:06:40 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:40 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:06:40 executing program 2:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:40 executing program 0:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:40 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:40 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:06:40 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:40 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3068.871865] loop3: detected capacity change from 0 to 131072
[ 3068.904895] loop0: detected capacity change from 0 to 131072
16:06:40 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3068.930711] loop6: detected capacity change from 0 to 131072
[ 3068.966557] loop5: detected capacity change from 0 to 131072
[ 3068.970965] loop2: detected capacity change from 0 to 131072
[ 3068.987879] msdos: Unknown parameter 'audit'
16:06:40 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3069.051110] loop3: detected capacity change from 0 to 131072
16:06:40 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
16:06:40 executing program 0:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3069.076610] FAT-fs (loop4): invalid media value (0xa4)
[ 3069.077525] FAT-fs (loop4): Can't find a valid FAT filesystem
16:06:40 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:06:40 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3069.128950] loop6: detected capacity change from 0 to 131072
[ 3069.136465] loop0: detected capacity change from 0 to 131072
16:06:40 executing program 2:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:40 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
[ 3069.180036] loop1: detected capacity change from 0 to 131072
[ 3069.217513] loop6: detected capacity change from 0 to 131072
[ 3069.281632] loop2: detected capacity change from 0 to 131072
[ 3069.323912] FAT-fs (loop4): invalid media value (0xa4)
[ 3069.324810] FAT-fs (loop4): Can't find a valid FAT filesystem
16:06:49 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:49 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
[ 3077.351699] loop5: detected capacity change from 0 to 131072
16:06:49 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3077.353791] msdos: Unknown parameter 'audit'
16:06:49 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:06:49 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
16:06:49 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:49 executing program 2:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:49 executing program 0:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3077.386057] loop1: detected capacity change from 0 to 131072
16:06:49 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:06:49 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
[ 3077.424817] loop0: detected capacity change from 0 to 131072
[ 3077.425085] loop2: detected capacity change from 0 to 131072
[ 3077.426812] loop3: detected capacity change from 0 to 131072
[ 3077.427297] loop6: detected capacity change from 0 to 131072
[ 3077.428414] loop4: detected capacity change from 0 to 131072
16:06:49 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3077.458208] FAT-fs (loop4): bogus number of reserved sectors
[ 3077.459174] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 3077.489076] loop1: detected capacity change from 0 to 131072
16:06:49 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3077.519791] loop5: detected capacity change from 0 to 131072
[ 3077.532744] loop3: detected capacity change from 0 to 131072
[ 3077.539047] msdos: Unknown parameter 'audit'
16:06:58 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
16:06:58 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:06:58 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
16:06:58 executing program 7:
delete_module(0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
16:06:58 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:58 executing program 2:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:06:58 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:58 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3086.985290] loop6: detected capacity change from 0 to 131072
[ 3087.027606] loop0: detected capacity change from 0 to 131072
[ 3087.037023] loop1: detected capacity change from 0 to 131072
[ 3087.038223] FAT-fs (loop4): invalid media value (0xa4)
[ 3087.038701] FAT-fs (loop4): Can't find a valid FAT filesystem
16:06:58 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
16:06:58 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3087.067522] loop5: detected capacity change from 0 to 131072
[ 3087.069737] msdos: Unknown parameter 'audit'
16:06:58 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {0x0, 0x0, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:58 executing program 2:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
16:06:58 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3087.120645] loop5: detected capacity change from 0 to 131072
[ 3087.126002] msdos: Unknown parameter 'audit'
16:06:58 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3087.163771] FAT-fs (loop4): invalid media value (0xa4)
[ 3087.164283] FAT-fs (loop4): Can't find a valid FAT filesystem
16:06:58 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:06:58 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:06:58 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
[ 3087.263500] loop6: detected capacity change from 0 to 131072
[ 3087.300388] loop1: detected capacity change from 0 to 131072
16:07:10 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:07:10 executing program 2:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:07:10 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@fsname}]})
16:07:10 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:07:10 executing program 7:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:07:10 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:10 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:10 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3098.311620] loop1: detected capacity change from 0 to 131072
16:07:10 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3098.366479] FAT-fs (loop4): invalid media value (0xa4)
[ 3098.366926] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 3098.399498] loop6: detected capacity change from 0 to 131072
[ 3098.401802] loop1: detected capacity change from 0 to 131072
16:07:10 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:07:10 executing program 7:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:07:10 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:10 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:10 executing program 2:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:07:10 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:10 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:07:10 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
[ 3098.564336] loop3: detected capacity change from 0 to 131072
[ 3098.590460] loop4: detected capacity change from 0 to 131072
[ 3098.610364] FAT-fs (loop4): bogus number of reserved sectors
[ 3098.611299] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 3098.671586] loop6: detected capacity change from 0 to 131072
16:07:20 executing program 7:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:07:20 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:07:20 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
16:07:20 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:20 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, 0x0)
16:07:20 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:07:20 executing program 2:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
[ 3108.448356] loop1: detected capacity change from 0 to 131072
[ 3108.454817] loop3: detected capacity change from 0 to 131072
16:07:20 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
16:07:20 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031", 0x72, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3108.545380] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3108.546698] loop6: detected capacity change from 0 to 131072
[ 3108.547088] FAT-fs (loop4): unable to read boot sector
[ 3108.561101] loop1: detected capacity change from 0 to 131072
16:07:20 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:07:20 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3108.663857] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3108.665190] FAT-fs (loop4): unable to read boot sector
16:07:29 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:07:29 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:07:29 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
16:07:29 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@permit_directio}, {@fsname}]})
16:07:29 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:29 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:29 executing program 2:
delete_module(0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
16:07:29 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3117.468335] loop6: detected capacity change from 0 to 131072
[ 3117.503000] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3117.504569] FAT-fs (loop4): unable to read boot sector
[ 3117.507094] loop1: detected capacity change from 0 to 131072
[ 3117.512078] loop3: detected capacity change from 0 to 131072
16:07:29 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, &(0x7f0000001640), 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3117.550331] FAT-fs (loop3): bogus number of reserved sectors
[ 3117.551542] FAT-fs (loop3): Can't find a valid FAT filesystem
16:07:29 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:29 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0)
16:07:29 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:29 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
16:07:29 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
16:07:29 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
[ 3117.679565] loop6: detected capacity change from 0 to 131072
[ 3117.703061] loop4: detected capacity change from 0 to 131072
16:07:29 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3117.713133] loop1: detected capacity change from 0 to 131072
16:07:29 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:29 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:29 executing program 2:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:07:29 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:29 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0)
[ 3117.852581] loop3: detected capacity change from 0 to 131072
[ 3117.876562] FAT-fs (loop3): bogus number of reserved sectors
[ 3117.877446] loop6: detected capacity change from 0 to 131072
[ 3117.878344] FAT-fs (loop3): Can't find a valid FAT filesystem
[ 3117.878898] loop0: detected capacity change from 0 to 131072
[ 3117.904434] loop4: detected capacity change from 0 to 131072
[ 3117.913858] loop1: detected capacity change from 0 to 131072
16:07:40 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:40 executing program 2:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:07:40 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:07:40 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0)
16:07:40 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:40 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0), 0x0, 0x46}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:40 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:07:40 executing program 7:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x2, &(0x7f0000001640)=[{&(0x7f0000001380)="a4", 0x1}, {0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:07:40 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0))
[ 3128.928842] loop6: detected capacity change from 0 to 131072
[ 3128.931879] loop1: detected capacity change from 0 to 131072
[ 3128.940595] loop0: detected capacity change from 0 to 131072
[ 3128.948960] loop3: detected capacity change from 0 to 131072
[ 3128.967908] FAT-fs (loop7): invalid media value (0xa4)
[ 3128.968792] FAT-fs (loop7): Can't find a valid FAT filesystem
[ 3128.971751] loop4: detected capacity change from 0 to 131072
[ 3128.985201] FAT-fs (loop3): bogus number of reserved sectors
[ 3128.986047] FAT-fs (loop3): Can't find a valid FAT filesystem
16:07:40 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:40 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:40 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:40 executing program 2:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:07:40 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3129.144046] loop0: detected capacity change from 0 to 131072
[ 3129.145386] loop7: detected capacity change from 0 to 131072
[ 3129.186847] loop1: detected capacity change from 0 to 131072
[ 3129.220085] loop6: detected capacity change from 0 to 131072
16:07:50 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:07:50 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}]})
16:07:50 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:50 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:50 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:50 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:50 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
16:07:50 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3138.713020] loop0: detected capacity change from 0 to 131072
[ 3138.725678] loop6: detected capacity change from 0 to 131072
[ 3138.754719] loop4: detected capacity change from 0 to 131072
[ 3138.756955] loop3: detected capacity change from 0 to 131072
[ 3138.767329] loop1: detected capacity change from 0 to 131072
[ 3138.773991] FAT-fs (loop4): bogus number of reserved sectors
[ 3138.774885] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 3138.805343] loop7: detected capacity change from 0 to 131072
16:07:50 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:50 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:50 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:07:50 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
16:07:50 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:07:50 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:07:50 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}]})
16:07:50 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3138.937048] loop0: detected capacity change from 0 to 131072
[ 3138.970884] loop1: detected capacity change from 0 to 131072
[ 3138.976687] loop6: detected capacity change from 0 to 131072
16:07:50 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0), 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3139.025439] loop3: detected capacity change from 0 to 131072
[ 3139.046574] loop4: detected capacity change from 0 to 131072
[ 3139.075191] FAT-fs (loop4): bogus number of reserved sectors
[ 3139.076069] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 3139.098609] loop7: detected capacity change from 0 to 131072
[ 3139.149515] loop0: detected capacity change from 0 to 131072
16:08:00 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:08:00 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:00 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:00 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:00 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
16:08:00 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:00 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:00 executing program 4:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0))
[ 3148.309952] loop6: detected capacity change from 0 to 131072
[ 3148.313269] loop3: detected capacity change from 0 to 131072
[ 3148.335459] loop4: detected capacity change from 0 to 131072
[ 3148.340582] loop1: detected capacity change from 0 to 131072
[ 3148.359227] FAT-fs (loop4): bogus number of reserved sectors
[ 3148.360186] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 3148.364045] loop7: detected capacity change from 0 to 131072
16:08:00 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:00 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:00 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:00 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{0x0}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:00 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:00 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:08:00 executing program 5:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
[ 3148.521870] loop6: detected capacity change from 0 to 131072
[ 3148.523752] loop3: detected capacity change from 0 to 131072
[ 3148.598420] loop1: detected capacity change from 0 to 131072
[ 3148.623366] loop2: detected capacity change from 0 to 131072
16:08:00 executing program 6:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380), 0x0, 0x4}, {&(0x7f00000013c0)="d2", 0x1, 0x46}, {0x0, 0x0, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3148.641750] msdos: Unknown parameter 'audit'
[ 3148.691104] loop6: detected capacity change from 0 to 131072
16:08:10 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:10 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:10 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:10 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:10 executing program 5:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:08:10 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
16:08:10 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:10 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3159.237526] loop1: detected capacity change from 0 to 131072
[ 3159.263774] loop3: detected capacity change from 0 to 131072
[ 3159.276689] loop2: detected capacity change from 0 to 131072
[ 3159.285293] loop4: detected capacity change from 0 to 131072
[ 3159.294885] msdos: Unknown parameter 'audit'
[ 3159.296294] msdos: Unknown parameter 'audit'
[ 3159.312461] loop6: detected capacity change from 0 to 131072
16:08:11 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:11 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:08:11 executing program 5:
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:08:11 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:11 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cb", 0x3, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:11 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:11 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {0x0, 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:11 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3159.511128] loop1: detected capacity change from 0 to 131072
[ 3159.515911] loop0: detected capacity change from 0 to 131072
[ 3159.537593] loop3: detected capacity change from 0 to 131072
[ 3159.542681] loop4: detected capacity change from 0 to 131072
[ 3159.554197] msdos: Unknown parameter 'audit'
16:08:11 executing program 5:
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
[ 3159.612554] loop6: detected capacity change from 0 to 131072
[ 3159.621937] loop2: detected capacity change from 0 to 131072
16:08:19 executing program 6:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0), 0x0, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:19 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:19 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:19 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:19 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:19 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:19 executing program 5:
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:08:19 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
[ 3167.483445] loop0: detected capacity change from 0 to 131072
[ 3167.513849] No source specified
16:08:19 executing program 7:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
[ 3167.525950] loop1: detected capacity change from 0 to 131072
16:08:19 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0)
[ 3167.541188] loop6: detected capacity change from 0 to 131072
[ 3167.549237] msdos: Unknown parameter 'audit'
[ 3167.562684] loop4: detected capacity change from 0 to 131072
[ 3167.569317] loop2: detected capacity change from 0 to 131072
16:08:19 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3167.605329] loop0: detected capacity change from 0 to 131072
16:08:19 executing program 5:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
[ 3167.634960] No source specified
16:08:28 executing program 5:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:08:28 executing program 7:
delete_module(0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
16:08:28 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:28 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:28 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:28 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0)
16:08:28 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:28 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3176.402100] loop4: detected capacity change from 0 to 131072
16:08:28 executing program 5:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x800)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
[ 3176.445161] loop2: detected capacity change from 0 to 131072
[ 3176.446486] loop0: detected capacity change from 0 to 131072
[ 3176.449981] loop6: detected capacity change from 0 to 131072
[ 3176.474813] loop1: detected capacity change from 0 to 131072
[ 3176.481842] No source specified
16:08:28 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:28 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, 0x0)
16:08:28 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3176.555694] loop0: detected capacity change from 0 to 131072
16:08:28 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
[ 3176.579366] loop2: detected capacity change from 0 to 131072
16:08:28 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:28 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f00000013c0)="d2", 0x1}, {&(0x7f00000014c0)='@', 0x1, 0x2000000}, {&(0x7f0000001500)="b6", 0x1}], 0x0, 0x0)
16:08:28 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:28 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:28 executing program 5:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:08:28 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:28 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3176.692186] loop0: detected capacity change from 0 to 131072
[ 3176.701844] loop2: detected capacity change from 0 to 131072
[ 3176.715681] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3176.719111] FAT-fs (loop3): unable to read boot sector
[ 3176.720474] loop1: detected capacity change from 0 to 131072
16:08:28 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3176.741962] loop6: detected capacity change from 0 to 131072
16:08:28 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3176.754791] msdos: Unknown parameter 'audit'
16:08:28 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3176.794686] loop0: detected capacity change from 0 to 131072
[ 3176.808558] loop4: detected capacity change from 0 to 131072
[ 3176.815817] msdos: Unknown parameter 'audit'
16:08:37 executing program 7:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:08:37 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:37 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:37 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:08:37 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:37 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:37 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:37 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600), 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3185.841789] loop0: detected capacity change from 0 to 131072
[ 3185.855368] loop2: detected capacity change from 0 to 131072
[ 3185.914394] loop1: detected capacity change from 0 to 131072
[ 3185.925857] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3185.927820] FAT-fs (loop3): unable to read boot sector
[ 3185.945255] loop6: detected capacity change from 0 to 131072
[ 3185.947872] loop4: detected capacity change from 0 to 131072
[ 3185.956608] msdos: Unknown parameter 'audit'
16:08:46 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0))
16:08:46 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:46 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:46 executing program 7:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:08:46 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {0x0, 0x0, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:46 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:46 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:46 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3194.361020] loop0: detected capacity change from 0 to 131072
16:08:46 executing program 7:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180))
16:08:46 executing program 5:
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, 0x0, &(0x7f00000012c0))
[ 3194.408631] loop6: detected capacity change from 0 to 131072
[ 3194.410627] loop2: detected capacity change from 0 to 131072
16:08:46 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3194.416323] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3194.417717] FAT-fs (loop3): unable to read boot sector
[ 3194.422026] loop1: detected capacity change from 0 to 131072
[ 3194.430042] msdos: Unknown parameter 'audit'
[ 3194.459590] loop0: detected capacity change from 0 to 131072
16:08:46 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:46 executing program 5:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f00000012c0))
16:08:46 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:46 executing program 1:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:46 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:46 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3194.554893] loop0: detected capacity change from 0 to 131072
16:08:46 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
16:08:46 executing program 6:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:46 executing program 5:
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0)
[ 3194.598073] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3194.600796] FAT-fs (loop6): unable to read boot sector
[ 3194.616886] loop1: detected capacity change from 0 to 131072
[ 3194.641876] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3194.644917] FAT-fs (loop3): unable to read boot sector
[ 3194.680520] loop2: detected capacity change from 0 to 131072
16:08:54 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:54 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:08:54 executing program 1:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:54 executing program 2:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:54 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:08:54 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:54 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
16:08:54 executing program 6:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
[ 3203.246568] loop0: detected capacity change from 0 to 131072
[ 3203.254912] loop2: detected capacity change from 0 to 131072
[ 3203.256400] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3203.258317] FAT-fs (loop3): unable to read boot sector
[ 3203.275957] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3203.276872] FAT-fs (loop6): unable to read boot sector
[ 3203.285565] loop5: detected capacity change from 0 to 131072
16:08:55 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}]})
16:08:55 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3203.309669] loop1: detected capacity change from 0 to 131072
16:08:55 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3203.344026] loop0: detected capacity change from 0 to 131072
16:08:55 executing program 7:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)
[ 3203.381674] loop2: detected capacity change from 0 to 131072
16:08:55 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@fat=@uid={'uid', 0x3d, 0xee00}}]})
16:08:55 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}]})
16:08:55 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:08:55 executing program 1:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3203.461944] loop0: detected capacity change from 0 to 131072
[ 3203.478294] loop6: detected capacity change from 0 to 131072
[ 3203.486330] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3203.488349] FAT-fs (loop3): unable to read boot sector
[ 3203.588544] loop1: detected capacity change from 0 to 131072
16:09:02 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}]})
16:09:02 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:02 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:02 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0)
16:09:02 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:02 executing program 2:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:02 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:02 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3211.267614] loop6: detected capacity change from 0 to 131072
[ 3211.273560] loop5: detected capacity change from 0 to 131072
[ 3211.293982] loop0: detected capacity change from 0 to 131072
[ 3211.316632] loop3: detected capacity change from 0 to 131072
16:09:03 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:03 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3211.327700] loop2: detected capacity change from 0 to 131072
[ 3211.338881] loop1: detected capacity change from 0 to 131072
16:09:03 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3211.348338] loop7: detected capacity change from 0 to 131072
[ 3211.351052] msdos: Unknown parameter 'audit'
16:09:03 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}]})
[ 3211.385967] loop6: detected capacity change from 0 to 131072
16:09:03 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0)
[ 3211.389719] loop5: detected capacity change from 0 to 131072
[ 3211.421989] loop0: detected capacity change from 0 to 131072
16:09:03 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:03 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:03 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3211.507692] loop3: detected capacity change from 0 to 131072
[ 3211.561056] loop1: detected capacity change from 0 to 131072
[ 3211.570014] loop7: detected capacity change from 0 to 131072
[ 3211.571455] msdos: Unknown parameter 'audit'
16:09:17 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0)={[], [{@audit}]})
16:09:17 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:17 executing program 1:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0)
16:09:17 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:17 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0)
16:09:17 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:17 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, 0x0)
16:09:17 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 3225.908628] loop0: detected capacity change from 0 to 131072
[ 3225.929946] loop7: detected capacity change from 0 to 131072
[ 3225.933237] loop3: detected capacity change from 0 to 131072
[ 3225.935926] loop5: detected capacity change from 0 to 131072
[ 3225.949093] loop2: detected capacity change from 0 to 131072
[ 3225.982118] FAT-fs (loop1): invalid media value (0x82)
[ 3225.983030] FAT-fs (loop1): Can't find a valid FAT filesystem
16:09:17 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
[ 3226.060888] FAT-fs (loop6): invalid media value (0x82)
[ 3226.061826] FAT-fs (loop6): Can't find a valid FAT filesystem
16:09:17 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0))
16:09:17 executing program 7:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:17 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:17 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}]})
16:09:17 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000280))
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3226.158005] loop7: detected capacity change from 0 to 131072
[ 3226.159718] loop2: detected capacity change from 0 to 131072
[ 3226.166516] msdos: Unknown parameter 'audit'
16:09:17 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3226.216909] loop1: detected capacity change from 0 to 131072
16:09:17 executing program 6:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:17 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3226.257439] loop0: detected capacity change from 0 to 131072
16:09:18 executing program 2:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3226.264995] loop3: detected capacity change from 0 to 131072
[ 3226.289878] loop5: detected capacity change from 0 to 131072
[ 3226.293242] loop6: detected capacity change from 0 to 131072
[ 3226.300054] msdos: Unknown parameter 'audit'
[ 3226.305212] FAT-fs (loop3): bogus number of reserved sectors
[ 3226.306730] FAT-fs (loop3): Can't find a valid FAT filesystem
16:09:18 executing program 1:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3226.389390] loop2: detected capacity change from 0 to 131072
[ 3226.391403] loop7: detected capacity change from 0 to 131072
[ 3226.401910] msdos: Unknown parameter 'audit'
16:09:18 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000012c0))
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:18 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3226.515478] loop1: detected capacity change from 0 to 131072
[ 3226.526936] msdos: Unknown parameter 'audit'
16:09:28 executing program 0:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000014c0)='@', 0x1, 0x2000000}], 0x0, &(0x7f00000016c0))
16:09:28 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:28 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:28 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:28 executing program 7:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:09:28 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:28 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:28 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}]})
[ 3236.945804] loop3: detected capacity change from 0 to 131072
[ 3236.951270] loop1: detected capacity change from 0 to 131072
[ 3236.955375] loop2: detected capacity change from 0 to 131072
[ 3236.958356] FAT-fs (loop3): bogus number of reserved sectors
[ 3236.958850] FAT-fs (loop3): Can't find a valid FAT filesystem
[ 3237.010511] loop0: detected capacity change from 0 to 131072
16:09:28 executing program 3:
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{0x0, 0x0, 0x2000000}], 0x0, &(0x7f00000016c0))
16:09:28 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:09:28 executing program 1:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3237.082460] loop3: detected capacity change from 0 to 131072
16:09:28 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:28 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3237.104985] FAT-fs (loop3): bogus number of reserved sectors
[ 3237.105493] FAT-fs (loop3): Can't find a valid FAT filesystem
[ 3237.130023] loop1: detected capacity change from 0 to 131072
[ 3237.141691] msdos: Unknown parameter 'audit'
16:09:39 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:39 executing program 4:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:39 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:39 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:39 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:09:39 executing program 0:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:39 executing program 7:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:09:39 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3247.397571] loop1: detected capacity change from 0 to 131072
[ 3247.409386] loop3: detected capacity change from 0 to 131072
[ 3247.420738] loop0: detected capacity change from 0 to 131072
16:09:39 executing program 4:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:39 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:09:39 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:39 executing program 7:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:09:39 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:50 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:50 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
16:09:50 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:50 executing program 4:
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:50 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:50 executing program 0:
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:50 executing program 7:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
16:09:50 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3258.341542] loop1: detected capacity change from 0 to 131072
[ 3258.366502] loop3: detected capacity change from 0 to 131072
[ 3258.376788] loop0: detected capacity change from 0 to 131072
16:09:50 executing program 7:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
16:09:50 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:50 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:50 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:50 executing program 4:
syz_open_dev$vcsn(0x0, 0x0, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:50 executing program 2:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
16:09:50 executing program 3:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
[ 3258.529112] loop1: detected capacity change from 0 to 131072
16:09:50 executing program 0:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:50 executing program 7:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
[ 3258.607800] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3258.612361] FAT-fs (loop3): unable to read boot sector
[ 3258.651042] loop0: detected capacity change from 0 to 131072
[ 3258.662589] msdos: Unknown parameter 'audit'
16:09:59 executing program 0:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:09:59 executing program 2:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
16:09:59 executing program 3:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140))
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:59 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
16:09:59 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:59 executing program 4:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:59 executing program 7:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
16:09:59 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:09:59 executing program 5:
delete_module(0x0, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:09:59 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3267.338774] loop1: detected capacity change from 0 to 131072
[ 3267.343893] loop3: detected capacity change from 0 to 131072
[ 3267.354260] msdos: Unknown parameter 'audit'
[ 3267.371998] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3267.377285] FAT-fs (loop0): unable to read boot sector
16:09:59 executing program 4:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:07 executing program 2:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
16:10:07 executing program 6:
delete_module(0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:07 executing program 4:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:07 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:07 executing program 7:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
16:10:07 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:10:07 executing program 3:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:10:07 executing program 5:
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3275.852247] loop1: detected capacity change from 0 to 131072
16:10:07 executing program 7:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3275.882014] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3275.888207] FAT-fs (loop3): unable to read boot sector
[ 3275.891794] loop0: detected capacity change from 0 to 131072
[ 3275.905790] msdos: Unknown parameter 'audit'
16:10:07 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
16:10:07 executing program 5:
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:07 executing program 6:
syz_open_dev$vcsn(0x0, 0x5f, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:07 executing program 2:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
16:10:07 executing program 4:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3275.976518] loop1: detected capacity change from 0 to 131072
16:10:07 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:10:07 executing program 7:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x0, 0x0)
16:10:07 executing program 5:
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:07 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:07 executing program 6:
syz_open_dev$vcsn(0x0, 0x0, 0x800)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:07 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:07 executing program 2:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
16:10:07 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f00000012c0))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:07 executing program 5:
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:07 executing program 4:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
16:10:07 executing program 6:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, &(0x7f0000001340)='./file0\x00', 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3276.187825] loop0: detected capacity change from 0 to 131072
[ 3276.206649] msdos: Unknown parameter 'audit'
[ 3276.228966] loop1: detected capacity change from 0 to 131072
16:10:15 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:15 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:15 executing program 4:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:10:15 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:10:15 executing program 5:
io_uring_setup(0x3a2f, 0x0)
16:10:15 executing program 2:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x0, 0x0)
16:10:15 executing program 6:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:15 executing program 7:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
[ 3284.014123] loop0: detected capacity change from 0 to 131072
[ 3284.019065] msdos: Unknown parameter 'audit'
16:10:15 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:10:15 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3284.070561] loop1: detected capacity change from 0 to 131072
16:10:15 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:10:15 executing program 6:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3284.166999] loop4: detected capacity change from 0 to 131072
[ 3284.168822] loop0: detected capacity change from 0 to 131072
[ 3284.170685] msdos: Unknown parameter 'audit'
[ 3284.173264] msdos: Unknown parameter 'audit'
16:10:24 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:24 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:24 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:10:24 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:10:24 executing program 5:
io_uring_setup(0x3a2f, 0x0)
16:10:24 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:24 executing program 2:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
r3 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r1, r0]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:24 executing program 6:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3293.164918] loop7: detected capacity change from 0 to 131072
[ 3293.172439] msdos: Unknown parameter 'audit'
[ 3293.193623] loop4: detected capacity change from 0 to 131072
16:10:24 executing program 5:
io_uring_setup(0x3a2f, 0x0)
16:10:24 executing program 6:
syz_open_dev$vcsn(0x0, 0x0, 0x0)
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3293.215630] loop2: detected capacity change from 0 to 131072
[ 3293.217780] loop0: detected capacity change from 0 to 131072
[ 3293.222628] msdos: Unknown parameter 'audit'
[ 3293.226544] msdos: Unknown parameter 'audit'
[ 3293.226548] loop1: detected capacity change from 0 to 131072
[ 3293.235696] msdos: Unknown parameter 'audit'
16:10:24 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3293.289724] loop7: detected capacity change from 0 to 131072
16:10:25 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:25 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3293.294332] msdos: Unknown parameter 'audit'
16:10:25 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:10:25 executing program 2:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:25 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:25 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3293.388052] loop2: detected capacity change from 0 to 131072
[ 3293.392680] loop7: detected capacity change from 0 to 131072
[ 3293.395179] msdos: Unknown parameter 'audit'
[ 3293.402696] msdos: Unknown parameter 'audit'
[ 3293.416118] loop1: detected capacity change from 0 to 131072
[ 3293.428934] loop0: detected capacity change from 0 to 131072
[ 3293.438949] msdos: Unknown parameter 'audit'
[ 3293.493030] loop4: detected capacity change from 0 to 131072
[ 3293.500472] msdos: Unknown parameter 'audit'
16:10:34 executing program 5:
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x10, 0x1, 0x2d3})
16:10:34 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:10:34 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
16:10:34 executing program 2:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:34 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:34 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:34 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
[ 3303.065946] loop4: detected capacity change from 0 to 131072
[ 3303.069726] loop2: detected capacity change from 0 to 131072
[ 3303.074387] msdos: Unknown parameter 'audit'
[ 3303.077266] msdos: Unknown parameter 'audit'
[ 3303.104458] loop7: detected capacity change from 0 to 131072
[ 3303.112682] msdos: Unknown parameter 'audit'
16:10:34 executing program 5:
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x1, 0x2d3})
[ 3303.114291] loop1: detected capacity change from 0 to 131072
16:10:34 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
16:10:34 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:10:34 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
16:10:34 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
[ 3303.199897] loop4: detected capacity change from 0 to 131072
[ 3303.206110] msdos: Unknown parameter 'audit'
16:10:34 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3303.251061] FAT-fs (loop2): invalid media value (0x82)
[ 3303.251593] FAT-fs (loop2): Can't find a valid FAT filesystem
16:10:34 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3303.350791] loop1: detected capacity change from 0 to 131072
[ 3303.373866] loop7: detected capacity change from 0 to 131072
[ 3303.379578] msdos: Unknown parameter 'audit'
16:10:44 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:10:44 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:44 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:10:44 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140))
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:44 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
16:10:44 executing program 5:
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x2d3})
16:10:44 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
16:10:44 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:10:44 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
[ 3312.632094] loop1: detected capacity change from 0 to 131072
[ 3312.683456] loop4: detected capacity change from 0 to 131072
[ 3312.699819] msdos: Unknown parameter 'audit'
[ 3312.725826] FAT-fs (loop6): invalid media value (0x82)
[ 3312.726662] FAT-fs (loop6): Can't find a valid FAT filesystem
16:10:44 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3312.801745] FAT-fs (loop2): invalid media value (0x82)
[ 3312.802902] FAT-fs (loop2): Can't find a valid FAT filesystem
16:10:44 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
16:10:44 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:44 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:10:44 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:10:44 executing program 5:
io_uring_setup(0x3a2f, &(0x7f0000001a80))
16:10:44 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
[ 3312.903871] loop1: detected capacity change from 0 to 131072
[ 3312.909675] FAT-fs (loop6): invalid media value (0x82)
[ 3312.910662] FAT-fs (loop6): Can't find a valid FAT filesystem
16:10:44 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x0)
16:10:44 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:10:44 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3313.025660] loop1: detected capacity change from 0 to 131072
16:10:44 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
[ 3313.180059] FAT-fs (loop2): invalid media value (0x82)
[ 3313.181037] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 3313.248958] FAT-fs (loop6): invalid media value (0x82)
[ 3313.250030] FAT-fs (loop6): Can't find a valid FAT filesystem
16:10:53 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
r0 = openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:10:53 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
16:10:53 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:10:53 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x0, 0x0)
16:10:53 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
16:10:53 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:10:53 executing program 5:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
16:10:53 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3321.896305] loop1: detected capacity change from 0 to 131072
16:10:53 executing program 0:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:10:53 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
openat$incfs(0xffffffffffffff9c, 0x0, 0x30042, 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3321.996634] loop1: detected capacity change from 0 to 131072
[ 3322.007953] FAT-fs (loop6): invalid media value (0x82)
[ 3322.008891] FAT-fs (loop6): Can't find a valid FAT filesystem
[ 3322.023808] FAT-fs (loop2): invalid media value (0x82)
[ 3322.024874] FAT-fs (loop2): Can't find a valid FAT filesystem
16:11:02 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:02 executing program 1:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:11:02 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
16:11:02 executing program 0:
delete_module(0x0, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:02 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:11:02 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:02 executing program 3:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
16:11:02 executing program 5:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
[ 3331.181932] loop1: detected capacity change from 0 to 131072
[ 3331.230617] FAT-fs (loop2): invalid media value (0x82)
[ 3331.231125] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 3331.232121] FAT-fs (loop3): invalid media value (0x82)
[ 3331.232575] FAT-fs (loop3): Can't find a valid FAT filesystem
[ 3331.260029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3331.270250] FAT-fs (loop5): unable to read boot sector
[ 3331.293342] FAT-fs (loop3): invalid media value (0x82)
[ 3331.293806] FAT-fs (loop3): Can't find a valid FAT filesystem
16:11:03 executing program 3:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
16:11:03 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:03 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:11:03 executing program 3:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x8e)
16:11:03 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:03 executing program 1:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:11:03 executing program 0:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
[ 3331.415842] FAT-fs (loop3): invalid media value (0x82)
[ 3331.416628] FAT-fs (loop3): Can't find a valid FAT filesystem
16:11:03 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
16:11:03 executing program 3:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x8e)
[ 3331.532263] loop1: detected capacity change from 0 to 131072
[ 3331.571503] FAT-fs (loop2): invalid media value (0x82)
[ 3331.572420] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 3331.645737] FAT-fs (loop3): invalid media value (0x82)
[ 3331.646587] FAT-fs (loop3): Can't find a valid FAT filesystem
16:11:12 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:13 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:13 executing program 3:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x8e)
16:11:13 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
16:11:13 executing program 2:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:13 executing program 0:
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:13 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:11:13 executing program 5:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
[ 3341.289378] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3341.291555] FAT-fs (loop5): unable to read boot sector
[ 3341.354940] loop1: detected capacity change from 0 to 131072
16:11:13 executing program 2:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:13 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:13 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
[ 3341.419566] FAT-fs (loop3): invalid media value (0x82)
[ 3341.420483] FAT-fs (loop3): Can't find a valid FAT filesystem
16:11:13 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:13 executing program 0:
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:13 executing program 4:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:13 executing program 3:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:11:13 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3341.561908] FAT-fs (loop3): invalid media value (0x82)
[ 3341.562867] FAT-fs (loop3): Can't find a valid FAT filesystem
[ 3341.591295] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3341.592813] FAT-fs (loop6): unable to read boot sector
[ 3341.601586] loop5: detected capacity change from 0 to 131072
[ 3341.604787] msdos: Unknown parameter 'audit'
16:11:13 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:11:13 executing program 5:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{0x0}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
[ 3341.691959] loop1: detected capacity change from 0 to 131072
16:11:13 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
16:11:13 executing program 2:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:13 executing program 4:
delete_module(0x0, 0x0)
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:13 executing program 0:
syz_io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
[ 3341.806549] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3341.809292] FAT-fs (loop5): unable to read boot sector
[ 3341.842102] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3341.845679] FAT-fs (loop6): unable to read boot sector
16:11:22 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:22 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:11:22 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:22 executing program 0:
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:22 executing program 5:
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:22 executing program 6:
delete_module(0x0, 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0)
r0 = syz_open_dev$vcsn(0x0, 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180))
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:22 executing program 4:
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:22 executing program 1:
syz_mount_image$msdos(0x0, 0x0, 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:11:22 executing program 4:
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:22 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
[ 3350.879911] loop5: detected capacity change from 0 to 131072
[ 3350.883246] msdos: Unknown parameter 'audit'
[ 3350.895725] loop6: detected capacity change from 0 to 131072
[ 3350.907646] msdos: Unknown parameter 'audit'
[ 3350.918493] loop1: detected capacity change from 0 to 131072
16:11:22 executing program 3:
syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
16:11:22 executing program 4:
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000280))
16:11:22 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:22 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:22 executing program 0:
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:22 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
[ 3351.011673] loop5: detected capacity change from 0 to 131072
[ 3351.017015] msdos: Unknown parameter 'audit'
16:11:31 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), 0x0, 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:31 executing program 0:
syz_io_uring_setup(0x1e5e, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:31 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x8e)
16:11:31 executing program 4:
syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0)
16:11:31 executing program 1:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:11:31 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
16:11:31 executing program 7:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:31 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3359.661919] loop5: detected capacity change from 0 to 131072
[ 3359.665613] msdos: Unknown parameter 'audit'
[ 3359.717088] loop1: detected capacity change from 0 to 131072
[ 3359.742312] FAT-fs (loop6): invalid media value (0x82)
[ 3359.743202] FAT-fs (loop6): Can't find a valid FAT filesystem
16:11:40 executing program 7:
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:40 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
16:11:40 executing program 6:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, 0x0, 0x40, 0x8e)
16:11:40 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:40 executing program 4:
r0 = syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(r0, &(0x7f0000001240)='.log\x00', 0x40, 0x8e)
16:11:40 executing program 0:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:40 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:40 executing program 1:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
16:11:40 executing program 7:
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
[ 3368.624212] No source specified
[ 3368.634535] loop5: detected capacity change from 0 to 131072
16:11:40 executing program 1:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
[ 3368.645735] msdos: Unknown parameter 'audit'
16:11:40 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
[ 3368.694272] FAT-fs (loop6): invalid media value (0x82)
[ 3368.694848] FAT-fs (loop6): Can't find a valid FAT filesystem
16:11:40 executing program 6:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x0, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001780)=""/99, 0x63, 0x1, &(0x7f0000001800)=""/227, 0xe3}, &(0x7f0000001940)=0x40)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:40 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:40 executing program 1:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
16:11:40 executing program 7:
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:40 executing program 0:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:40 executing program 7:
io_uring_setup(0x0, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:40 executing program 4:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x40, 0x0)
[ 3368.804593] No source specified
16:11:40 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
r1 = syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000001a00)={0x6, 0x0, &(0x7f00000019c0)=[r0, 0xffffffffffffffff]}, 0x2)
16:11:40 executing program 7:
io_uring_setup(0x3a2f, 0x0)
16:11:40 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:40 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
16:11:40 executing program 6:
r0 = syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)="82", 0x1}], 0x0, 0x0)
openat$incfs(r0, &(0x7f0000001240)='.log\x00', 0x40, 0x8e)
[ 3368.936915] No source specified
[ 3368.942296] loop5: detected capacity change from 0 to 131072
[ 3368.953876] msdos: Unknown parameter 'audit'
16:11:50 executing program 7:
io_uring_setup(0x3a2f, 0x0)
16:11:50 executing program 6:
r0 = syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{&(0x7f0000000f80)}], 0x0, &(0x7f00000011c0))
openat$incfs(r0, &(0x7f0000001240)='.log\x00', 0x40, 0x8e)
16:11:50 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
16:11:50 executing program 0:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
16:11:50 executing program 4:
delete_module(&(0x7f0000000000)='@\x00', 0x0)
io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040), 0x1)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x800)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
io_uring_setup(0x3a2f, &(0x7f0000001a80)={0x0, 0x6b9a, 0x10, 0x1, 0x2d3})
16:11:50 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:50 executing program 1:
syz_mount_image$msdos(&(0x7f0000001300), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
16:11:50 executing program 5:
delete_module(0x0, 0x0)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="0afb8dcc7db3d5e8c47f8dd266b4dfc4", 0x10)
r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5f, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140))
socket$inet_tcp(0x2, 0x1, 0x0)
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0)={0x0, 0x9153, 0x4, 0x1, 0x15d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280))
mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000)
syz_mount_image$msdos(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x10001, 0x5, &(0x7f0000001640)=[{&(0x7f0000001380)="a42e57c4130731f800bd5451263d94b84af22d9453ec37c34e1a5c5321aab2d4cb43a1fba004de09650c687273097d36d7", 0x31, 0x4}, {&(0x7f00000013c0)="d272460bb63ca890bcc7ee3409cc4a4a6d150ac44614b6443a308b663a9d9a8661e60423c05a26cc257024e7f6a12f8ab033d635e8a8146113553cce8c8990286377063bcd7d0608ea5d9ad5a09934a6380bef693e5d86fd831b615f4e7e1e14d8317a4c6c880c1dc6508ff193257e8e7031e2abdb1557c2f9ae9c9ac50b22bda78f54f31c8636c018e626b2420b5c45cf7c390ca46c665828c9e16feac3f490f6a8dfd729ac3207f39d1b2c23e009778293cb0c0c31cd9e348fbf80c62bc176a10402915d941446b85814988c9fb8875e8ced7d6162978b9ff95d49a95223d6320e10", 0xe3, 0x46}, {&(0x7f00000014c0)="402941271061678077ab7565cf", 0xd, 0x2000000}, {&(0x7f0000001500)="b6ae33f9269c797b58e81d27c1064831d437211fa3810e23d4244913a730f871e9b226cc0c8d368ded7b833994b6ab674c8c52ed9f35fbbc885bdb9a96b2ade0f33f059550ed01d3d170a928689dcd935e8a3674bf75e05c5c2e42d2baff2d26f1b91836746e807ed1adc2b2ac24b0e32c0719e93ce2058ad01cc4f9da5d53b238f408e8d518b1b336ce97bc71d731963ffb7c476981bb3abe439a5d2c3d72e50d360a7663c37e1e0a47924763923e7b5f5bd619229717630ffd41691f4d1b6ee05eaa524130e69654013bb2", 0xcc, 0x5}, {&(0x7f0000001600)="4b75cbd1", 0x4, 0x1}], 0x8000, &(0x7f00000016c0)={[{@fat=@check_normal}, {@fat=@tz_utc}, {@dots}, {@nodots}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@dots}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '!&/%'}}, {@appraise}, {@permit_directio}, {@fsname}]})
syz_open_dev$vcsn(&(0x7f0000001980), 0x1ff, 0x10001)
[ 3378.429038] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3378.433116] loop5: detected capacity change from 0 to 131072
[ 3378.433239] ------------[ cut here ]------------
[ 3378.434238] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3378.434898] percpu ref (io_ring_ctx_ref_free) <= 0 (0) after switching to atomic
[ 3378.436548] WARNING: lib/percpu-refcount.c:197 at percpu_ref_switch_to_atomic_rcu+0x3cc/0x480, CPU#0: syz-executor.5/18028
[ 3378.438212] FAT-fs (loop2): unable to read boot sector
[ 3378.439212] Modules linked in:
[ 3378.440520] CPU: 0 UID: 0 PID: 18028 Comm: syz-executor.5 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
[ 3378.442277] Tainted: [W]=WARN
[ 3378.442738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 3378.443970] RIP: 0010:percpu_ref_switch_to_atomic_rcu+0x3cc/0x480
[ 3378.444929] Code: 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 9e 00 00 00 49 8b 75 e8 48 c7 c7 c0 99 e2 84 e8 25 ac e9 fe 90 <0f> 0b 90 90 e9 2b ff ff ff e8 56 de 5f ff e9 9e fe ff ff e8 dc de
[ 3378.447618] RSP: 0018:ffff88806ce08e20 EFLAGS: 00010286
[ 3378.448428] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8139de70
[ 3378.449039] loop4: detected capacity change from 0 to 131072
[ 3378.449481] RDX: ffff888015755280 RSI: ffffffff8139de7e RDI: 0000000000000001
[ 3378.451392] RBP: 7fffffffffffffff R08: 0000000000000001 R09: ffffed100d9c117f
[ 3378.452471] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800db60980
[ 3378.453542] R13: ffff88800db609a0 R14: 0000000000000002 R15: 0000000000000003
[ 3378.454624] FS: 00007f8e5d7e9700(0000) GS:ffff8880e55d8000(0000) knlGS:0000000000000000
[ 3378.457088] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3378.460893] CR2: 00007fcfbfc9d018 CR3: 000000000f673000 CR4: 0000000000350ef0
[ 3378.463346] Call Trace:
[ 3378.463747]
[ 3378.464022] msdos: Unknown parameter 'audit'
[ 3378.464076] ? rcu_core+0x7c3/0x1800
[ 3378.465296] rcu_core+0x7c8/0x1800
[ 3378.465843] ? __pfx_rcu_core+0x10/0x10
[ 3378.466461] ? mark_held_locks+0x49/0x80
[ 3378.467074] handle_softirqs+0x1b1/0x770
[ 3378.467730] __irq_exit_rcu+0xc4/0x100
[ 3378.468347] irq_exit_rcu+0x9/0x20
[ 3378.468877] sysvec_apic_timer_interrupt+0x70/0x80
[ 3378.469633]
[ 3378.469974]
[ 3378.470335] asm_sysvec_apic_timer_interrupt+0x1a/0x20
[ 3378.471098] RIP: 0010:vprintk_store+0x17f/0xa20
[ 3378.471841] Code: e8 86 97 1f 00 41 80 fd 03 0f 86 ce 00 00 00 e8 a7 9c 1f 00 48 89 ee 31 ff 45 31 e4 e8 fa 97 1f 00 48 85 ed 0f 85 6e 04 00 00 8c 9c 1f 00 48 b8 00 00 00 00 00 fc ff df 48 03 44 24 08 48 c7
[ 3378.474446] RSP: 0018:ffff88803c1774c0 EFLAGS: 00000202
[ 3378.475252] RAX: 00000000000001d3 RBX: ffff88806ce24025 RCX: 0000000000000040
[ 3378.476315] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff81545e97
[ 3378.477365] RBP: 0000000000000200 R08: 0000000000000001 R09: 0000000000000001
[ 3378.478412] R10: ffffffff8643b457 R11: 0000000000000001 R12: 0000000000000030
[ 3378.479456] R13: ffffffff85bd84e0 R14: 0000000000000000 R15: 0000000000000002
[ 3378.480521] ? vprintk_store+0x5f7/0xa20
[ 3378.481172] ? __pfx_vprintk_store+0x10/0x10
[ 3378.481855] ? find_held_lock+0x2b/0x80
[ 3378.482482] ? kernfs_add_one+0x14b/0x830
[ 3378.483105] ? make_vfsgid+0xf7/0x150
[ 3378.483716] ? __pfx_make_vfsgid+0x10/0x10
[ 3378.484376] ? is_printk_cpu_sync_owner+0x32/0x40
[ 3378.485093] vprintk_emit+0x143/0x630
[ 3378.485703] ? __pfx_vprintk_emit+0x10/0x10
[ 3378.486392] _printk+0xbe/0xf0
[ 3378.486884] ? __pfx__printk+0x10/0x10
[ 3378.487496] ? find_held_lock+0x2b/0x80
[ 3378.488118] ? set_capacity_and_notify+0xce/0x240
[ 3378.488857] ? lock_release+0xc8/0x290
[ 3378.489473] set_capacity_and_notify+0x16a/0x240
[ 3378.490197] ? __pfx_set_capacity_and_notify+0x10/0x10
[ 3378.490969] ? lock_is_held_type+0x9e/0x120
[ 3378.491660] loop_configure+0xcb9/0x1590
[ 3378.492343] ? __pfx_loop_configure+0x10/0x10
[ 3378.493044] ? avc_has_extended_perms+0x107/0xf20
[ 3378.493804] ? find_held_lock+0x2b/0x80
[ 3378.494425] ? avc_has_extended_perms+0x23b/0xf20
[ 3378.495183] ? lock_release+0xc8/0x290
[ 3378.495774] lo_ioctl+0x66d/0x1c70
[ 3378.496347] ? __pfx_lo_ioctl+0x10/0x10
[ 3378.496941] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 3378.497739] ? lock_acquire+0x15e/0x2f0
[ 3378.498372] ? __virt_addr_valid+0x1c6/0x5d0
[ 3378.499054] ? find_held_lock+0x2b/0x80
[ 3378.499692] ? __virt_addr_valid+0x2e8/0x5d0
[ 3378.500390] ? lock_release+0xc8/0x290
[ 3378.500978] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 3378.501797] ? percpu_is_read_locked+0x100/0x1d0
[ 3378.502527] ? __fget_files+0x34/0x3b0
[ 3378.503118] ? find_held_lock+0x2b/0x80
[ 3378.503749] ? __fget_files+0x203/0x3b0
[ 3378.504368] ? __pfx_lo_ioctl+0x10/0x10
[ 3378.504980] blkdev_ioctl+0x27c/0x6c0
[ 3378.505569] ? __pfx_blkdev_ioctl+0x10/0x10
[ 3378.506240] ? selinux_file_ioctl+0xb9/0x280
[ 3378.506903] ? __pfx_blkdev_ioctl+0x10/0x10
[ 3378.507578] __x64_sys_ioctl+0x18f/0x210
[ 3378.508228] do_syscall_64+0xbf/0x360
[ 3378.508795] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 3378.509569] RIP: 0033:0x7f8e602738d7
[ 3378.510124] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3378.512808] RSP: 002b:00007f8e5d7e8f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 3378.513941] RAX: ffffffffffffffda RBX: 00007f8e602bd970 RCX: 00007f8e602738d7
[ 3378.515012] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 3378.516086] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000
[ 3378.517160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 3378.518221] R13: 0000000000000005 R14: 00000000200016b8 R15: 0000000000000005
[ 3378.519316]
[ 3378.519681] irq event stamp: 1410
[ 3378.520210] hardirqs last enabled at (1420): [] __up_console_sem+0x78/0x80
[ 3378.521481] hardirqs last disabled at (1429): [] __up_console_sem+0x5d/0x80
[ 3378.522755] softirqs last enabled at (0): [] copy_process+0x1e58/0x73c0
[ 3378.523984] softirqs last disabled at (469): [] __irq_exit_rcu+0xc4/0x100
[ 3378.525243] ---[ end trace 0000000000000000 ]---
[ 3378.525933] percpu_ref_switch_to_atomic_rcu: percpu_ref_switch_to_atomic_rcu(): percpu_ref underflow slab kmalloc-64 start ffff88800db60980 pointer offset 0 size 64
[ 3378.533837] FAT-fs (loop6): unable to read boot sector
16:11:50 executing program 2:
syz_mount_image$msdos(&(0x7f0000000f00), &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
openat$incfs(0xffffffffffffffff, &(0x7f0000001240)='.log\x00', 0x0, 0x0)
16:11:50 executing program 3:
syz_mount_image$msdos(0x0, &(0x7f0000000f40)='./file0\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f00000011c0))
16:11:50 executing program 7:
io_uring_setup(0x3a2f, 0x0)
[ 3378.637947] msdos: Unknown parameter 'audit'
16:11:50 executing program 0:
syz_io_uring_setup(0x1e5e, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000280))
[ 3378.673059] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2
[ 3378.675216] FAT-fs (loop2): unable to read boot sector
VM DIAGNOSIS:
16:11:50 Registers:
info registers vcpu 0
RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd
RSI=ffffffff828e5070 RDI=ffffffff88729280 RBP=ffffffff88729240 RSP=ffff88806ce08718
R8 =0000000000000000 R9 =ffffed1001490046 R10=00000000000fe503 R11=0000000000000001
R12=0000000000000823 R13=0000000000000020 R14=fffffbfff10e52a2 R15=dffffc0000000000
RIP=ffffffff828e50c5 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f8e5d7e9700 00000000 00000000
GS =0000 ffff8880e55d8000 00000000 00000000
LDT=0000 fffffe7c00000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007fcfbfc9d018 CR3=000000000f673000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525
XMM02=ffffffffffffffffffffffffffffffff XMM03=00000000000000000000000000000000
XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000
XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000
XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
info registers vcpu 1
RAX=ffffed100d9e501d RBX=0000000000000000 RCX=ffffffff8161ace8 RDX=ffff888015511b80
RSI=ffffffff8161ad3a RDI=0000000000000005 RBP=0000000000000004 RSP=ffff88806cf08e98
R8 =0000000000000000 R9 =fffffbfff0c8768a R10=0000000000000010 R11=0000000000000001
R12=ffff88806cf28080 R13=ffff88806cf28300 R14=7fffffffffffffff R15=dffffc0000000000
RIP=ffffffff8173f6b8 RFL=00000086 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f815a0e3900 00000000 00000000
GS =0000 ffff8880e56d8000 00000000 00000000
LDT=0000 fffffe1600000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f815955c030 CR3=0000000009f0a000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=ffffffffffffffffffffffffffffffff XMM01=30306234386136303638616663356134
XMM02=38303062343861363036386166633561 XMM03=2f6c616e72756f6a2f676f6c2f6e7572
XMM04=e07791d575faa6dd000000000041b1c0 XMM05=d3fdd5f48436fbd700000000000aead0
XMM06=cd6e809af35945b500000000000ae988 XMM07=00000000000000000000000000000000
XMM08=44495f474f4c5359530069253d595449 XMM09=00000000000000000000000000000000
XMM10=00000020000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000