MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 443.959537][T14842] loop1: detected capacity change from 0 to 24 [ 443.967001][T14841] loop4: detected capacity change from 0 to 24 [ 443.974438][T14842] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 443.986709][T14841] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 16:59:54 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) 16:59:54 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) 16:59:54 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 444.085467][T14848] loop2: detected capacity change from 0 to 1 16:59:54 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 444.146265][T14850] loop0: detected capacity change from 0 to 1 16:59:54 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 444.225084][T14852] loop2: detected capacity change from 0 to 24 [ 444.233371][T14852] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 444.264048][T14854] loop3: detected capacity change from 0 to 24 [ 444.271659][T14854] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 444.297626][T14856] loop0: detected capacity change from 0 to 24 [ 444.320710][T14856] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 16:59:55 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) 16:59:55 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8", 0x30, 0x4}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) 16:59:55 executing program 5: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, &(0x7f0000000a80)=""/66, 0x42) [ 444.820647][T14862] loop4: detected capacity change from 0 to 1 [ 444.831678][T14860] loop1: detected capacity change from 0 to 1 16:59:55 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:55 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 444.975687][T14866] loop1: detected capacity change from 0 to 24 [ 444.983399][T14866] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 445.009019][T14868] loop4: detected capacity change from 0 to 24 [ 445.016812][T14868] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 16:59:55 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:55 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 445.070510][T14871] loop2: detected capacity change from 0 to 24 [ 445.077795][T14871] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 16:59:55 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 445.121368][T14874] loop3: detected capacity change from 0 to 24 [ 445.129202][T14874] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 445.179567][T14876] loop0: detected capacity change from 0 to 24 [ 445.191777][T14876] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 16:59:56 executing program 5: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, &(0x7f0000000a80)=""/66, 0x42) 16:59:56 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:56 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {0x0, 0x0, 0x4}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) 16:59:56 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {0x0, 0x0, 0x4}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) 16:59:56 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 445.828890][T14882] loop1: detected capacity change from 0 to 24 [ 445.837230][T14882] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 445.866065][T14884] loop4: detected capacity change from 0 to 1 16:59:56 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 445.924596][T14889] loop2: detected capacity change from 0 to 24 [ 445.935858][T14889] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 445.947134][T14887] loop4: detected capacity change from 0 to 1 16:59:56 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:56 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) [ 445.975709][T14891] loop3: detected capacity change from 0 to 24 [ 445.984566][T14891] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 446.015223][T14893] loop0: detected capacity change from 0 to 24 [ 446.026546][T14893] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 446.104749][T14896] loop4: detected capacity change from 0 to 1 16:59:56 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) 16:59:56 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86", 0x1}], 0x40, 0x0) [ 446.233123][ T3903] blk_print_req_error: 20 callbacks suppressed [ 446.233141][ T3903] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 446.244537][T14899] loop4: detected capacity change from 0 to 1 [ 446.249682][ T3903] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:59:57 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 446.393863][ T3903] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 446.406376][T14901] loop4: detected capacity change from 0 to 1 16:59:57 executing program 5: pipe(0x0) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) 16:59:57 executing program 5: pipe(0x0) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 446.505363][ T3903] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 446.516660][T14903] loop4: detected capacity change from 0 to 24 [ 446.524899][T14903] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 16:59:57 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:57 executing program 5: pipe(0x0) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) 16:59:57 executing program 5: pipe(&(0x7f0000000a00)) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 446.695436][T14912] loop1: detected capacity change from 0 to 24 [ 446.711403][T14912] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 16:59:57 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:57 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 446.779377][T14916] loop2: detected capacity change from 0 to 24 [ 446.788096][T14916] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 16:59:57 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:57 executing program 5: pipe(&(0x7f0000000a00)) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 446.825300][T14919] loop3: detected capacity change from 0 to 24 [ 446.836018][T14919] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 16:59:57 executing program 5: pipe(&(0x7f0000000a00)) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) 16:59:57 executing program 5: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, 0x0, 0x0) [ 446.891646][T14924] loop0: detected capacity change from 0 to 24 [ 446.911854][T14924] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 446.955457][ T3903] I/O error, dev loop0, sector 8 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 16:59:58 executing program 4: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, 0x0, 0x0) 16:59:58 executing program 5: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, 0x0, 0x0) 16:59:58 executing program 5: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, 0x0, 0x0) 16:59:58 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) 16:59:58 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:58 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb4536", 0x5b, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 447.548773][T14938] loop4: detected capacity change from 0 to 24 [ 447.549548][T14941] loop1: detected capacity change from 0 to 8 [ 447.559512][T14938] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 447.567501][T14940] loop5: detected capacity change from 0 to 24 16:59:58 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) [ 447.598626][T14940] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 16:59:58 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 447.660878][T14944] loop2: detected capacity change from 0 to 8 [ 447.696785][T14946] loop3: detected capacity change from 0 to 24 16:59:58 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) 16:59:58 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) 16:59:58 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 447.704504][T14946] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 16:59:58 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86", 0x1, 0x84b}], 0x40, 0x0) [ 447.767179][T14951] loop1: detected capacity change from 0 to 8 [ 447.776217][T14948] loop0: detected capacity change from 0 to 24 [ 447.785352][T14948] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 447.795520][T14952] loop2: detected capacity change from 0 to 24 [ 447.804850][T14952] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 447.873030][ T3902] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 447.892044][T14955] loop1: detected capacity change from 0 to 8 [ 447.901570][ T3902] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 447.913680][ T3902] buffer_io_error: 12 callbacks suppressed 16:59:58 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c0", 0x2, 0x84b}], 0x40, 0x0) [ 447.913695][ T3902] Buffer I/O error on dev loop1, logical block 0, async page read 16:59:58 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c0", 0x2, 0x84b}], 0x40, 0x0) [ 447.973828][T14958] loop1: detected capacity change from 0 to 8 16:59:58 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 448.075432][T14960] loop1: detected capacity change from 0 to 8 [ 448.133925][T14962] loop1: detected capacity change from 0 to 24 [ 448.142749][T14962] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 16:59:59 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) 16:59:59 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) 16:59:59 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb4536", 0x5b, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 448.417188][T14966] loop4: detected capacity change from 0 to 8 [ 448.418278][T14967] loop5: detected capacity change from 0 to 8 16:59:59 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) 16:59:59 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 16:59:59 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 448.545803][T14969] loop5: detected capacity change from 0 to 24 [ 448.547459][T14971] loop3: detected capacity change from 0 to 24 [ 448.560431][T14971] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 448.575278][T14969] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 16:59:59 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e", 0x3, 0x84b}], 0x40, 0x0) [ 448.595204][T14973] loop0: detected capacity change from 0 to 24 [ 448.613846][T14975] loop4: detected capacity change from 0 to 8 [ 448.625179][T14973] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 16:59:59 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e", 0x3, 0x84b}], 0x40, 0x0) 16:59:59 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 448.651714][T14978] loop2: detected capacity change from 0 to 8 16:59:59 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) 16:59:59 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 448.704315][T14980] loop0: detected capacity change from 0 to 24 [ 448.711468][T14980] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 448.733219][T14982] loop2: detected capacity change from 0 to 8 [ 448.740580][ T3903] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 448.761644][T14984] loop4: detected capacity change from 0 to 8 [ 448.770266][T14986] loop0: detected capacity change from 0 to 24 [ 448.777813][T14986] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 16:59:59 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) 16:59:59 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) 16:59:59 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb4536", 0x5b, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 448.955415][T14989] loop2: detected capacity change from 0 to 24 [ 448.979806][T14990] loop4: detected capacity change from 0 to 24 [ 448.980032][T14992] loop1: detected capacity change from 0 to 8 [ 448.994495][T14989] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 449.009119][T14990] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 449.175270][ T3628] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 17:00:00 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) 17:00:00 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740), 0x0, 0x84b}], 0x40, 0x0) 17:00:00 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}], 0x40, 0x0) 17:00:00 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}], 0x40, 0x0) 17:00:00 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}], 0x40, 0x0) 17:00:00 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}], 0x40, 0x0) [ 449.376472][T14996] loop2: detected capacity change from 0 to 8 [ 449.398292][T15000] loop1: detected capacity change from 0 to 8 [ 449.410112][T15001] loop5: detected capacity change from 0 to 8 17:00:00 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}], 0x40, 0x0) 17:00:00 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, 0x0) 17:00:00 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 449.431187][T15003] loop3: detected capacity change from 0 to 8 [ 449.500811][T15005] loop2: detected capacity change from 0 to 8 [ 449.522819][ T3902] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 449.536155][T15007] loop3: detected capacity change from 0 to 1 17:00:00 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c", 0x55, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:00 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 449.545395][T15009] loop5: detected capacity change from 0 to 24 [ 449.559795][T15011] loop1: detected capacity change from 0 to 8 [ 449.563908][T15009] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 449.630248][T15013] loop2: detected capacity change from 0 to 24 [ 449.637673][T15013] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 449.694578][ T3628] Buffer I/O error on dev loop2, logical block 1, async page read [ 449.695818][T15016] loop3: detected capacity change from 0 to 24 [ 449.708946][ T3903] Buffer I/O error on dev loop3, logical block 0, async page read [ 449.717984][ T3628] Buffer I/O error on dev loop2, logical block 2, async page read [ 449.729999][T15016] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 449.734459][ T3628] Buffer I/O error on dev loop2, logical block 3, async page read [ 449.761566][ T3628] Buffer I/O error on dev loop2, logical block 4, async page read [ 449.775655][ T3628] Buffer I/O error on dev loop2, logical block 5, async page read [ 449.787359][ T3628] Buffer I/O error on dev loop2, logical block 6, async page read 17:00:00 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, 0x0) [ 449.800102][ T3628] Buffer I/O error on dev loop2, logical block 7, async page read [ 449.856866][T15019] loop4: detected capacity change from 0 to 1 17:00:00 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) 17:00:00 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, 0x0) 17:00:00 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, 0x0) 17:00:00 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 450.227942][T15023] loop4: detected capacity change from 0 to 1 [ 450.245495][T15022] loop1: detected capacity change from 0 to 1 17:00:00 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) 17:00:01 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 450.351462][T15027] loop1: detected capacity change from 0 to 24 [ 450.360309][T15027] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:01 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) 17:00:01 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) [ 450.403833][T15031] loop5: detected capacity change from 0 to 24 [ 450.411714][T15031] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:01 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:01 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c", 0x55, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:01 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 450.491730][T15036] loop2: detected capacity change from 0 to 24 [ 450.508742][T15036] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 450.531493][T15041] loop4: detected capacity change from 0 to 24 [ 450.542997][T15041] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 450.561194][T15043] loop3: detected capacity change from 0 to 24 [ 450.584636][ T3902] Buffer I/O error on dev loop4, logical block 1, async page read 17:00:01 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 450.736515][T15046] loop3: detected capacity change from 0 to 24 [ 450.744501][T15046] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:01 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) 17:00:01 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:01 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:01 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 451.201581][T15051] loop1: detected capacity change from 0 to 24 17:00:01 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c", 0x55, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 451.249849][T15053] loop5: detected capacity change from 0 to 24 17:00:02 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 451.303519][ T3903] blk_print_req_error: 20 callbacks suppressed [ 451.303536][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 451.312063][T15055] loop1: detected capacity change from 0 to 24 [ 451.320669][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 17:00:02 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:02 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:02 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c", 0x55, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 451.359731][T15057] loop2: detected capacity change from 0 to 24 [ 451.394010][T15060] loop4: detected capacity change from 0 to 24 17:00:02 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 451.416224][ T3902] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 451.436554][T15061] loop1: detected capacity change from 0 to 24 17:00:02 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 451.466392][T15063] loop5: detected capacity change from 0 to 24 [ 451.473914][ T3604] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 451.486848][T15063] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 451.516016][T15065] loop2: detected capacity change from 0 to 24 [ 451.524296][T15065] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:02 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 451.560959][T15067] loop1: detected capacity change from 0 to 24 [ 451.590675][T15070] loop4: detected capacity change from 0 to 24 [ 451.610905][T15072] loop3: detected capacity change from 0 to 24 [ 451.618565][T15072] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 451.628851][T15070] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 451.736073][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 17:00:02 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r2, &(0x7f0000000a80)=""/66, 0x42) 17:00:02 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:02 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 451.963946][T15076] loop1: detected capacity change from 0 to 24 17:00:02 executing program 1: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 452.055292][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 452.064574][T15080] loop1: detected capacity change from 0 to 24 [ 452.066182][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 452.165164][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 452.173331][T15082] loop1: detected capacity change from 0 to 24 [ 452.174963][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 17:00:02 executing program 5: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:02 executing program 1: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:03 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:03 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 452.275447][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 452.309538][T15086] loop5: detected capacity change from 0 to 24 [ 452.317627][T15084] loop1: detected capacity change from 0 to 24 17:00:03 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:03 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, 0x0, 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 452.365960][T15088] loop2: detected capacity change from 0 to 24 [ 452.373948][T15088] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:03 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 452.413297][T15090] loop1: detected capacity change from 0 to 24 [ 452.420711][T15090] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 452.465916][T15092] loop4: detected capacity change from 0 to 24 [ 452.473243][T15094] loop5: detected capacity change from 0 to 24 [ 452.486893][T15094] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 452.500386][T15096] loop3: detected capacity change from 0 to 24 [ 452.507960][T15096] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:03 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, 0x0, 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 452.626808][T15100] loop4: detected capacity change from 0 to 24 17:00:03 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r2, &(0x7f0000000a80)=""/66, 0x42) 17:00:03 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 452.815746][T15103] loop4: detected capacity change from 0 to 24 [ 452.825587][T15103] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:03 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, 0x0, 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:03 executing program 2: ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:03 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c", 0x55, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 453.216495][T15107] loop2: detected capacity change from 0 to 24 17:00:03 executing program 5: ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:04 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) [ 453.260562][T15109] loop1: detected capacity change from 0 to 24 [ 453.269424][T15109] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 453.297466][T15111] loop2: detected capacity change from 0 to 24 17:00:04 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:04 executing program 5: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 453.343611][T15114] loop5: detected capacity change from 0 to 24 [ 453.366481][T15116] loop3: detected capacity change from 0 to 24 [ 453.380705][T15116] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 453.462478][T15118] loop2: detected capacity change from 0 to 24 [ 453.469530][T15118] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:04 executing program 5: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 453.520550][T15120] loop5: detected capacity change from 0 to 24 17:00:04 executing program 5: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:04 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 453.605785][T15123] loop5: detected capacity change from 0 to 24 17:00:04 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r2, &(0x7f0000000a80)=""/66, 0x42) [ 453.664424][T15125] loop4: detected capacity change from 0 to 24 17:00:04 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 453.723933][T15129] loop5: detected capacity change from 0 to 24 17:00:04 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 453.774144][T15131] loop4: detected capacity change from 0 to 24 17:00:04 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 453.825673][T15133] loop5: detected capacity change from 0 to 24 [ 453.934103][T15135] loop4: detected capacity change from 0 to 24 [ 453.941489][T15135] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:04 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:04 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 454.106451][T15137] loop5: detected capacity change from 0 to 24 [ 454.123119][T15137] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 454.128663][T15139] loop1: detected capacity change from 0 to 24 [ 454.141004][T15139] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:04 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)) [ 454.230611][T15142] loop3: detected capacity change from 0 to 24 [ 454.239094][T15142] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:04 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) 17:00:04 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 454.322281][T15144] loop2: detected capacity change from 0 to 24 [ 454.333620][T15146] loop3: detected capacity change from 0 to 24 [ 454.334672][T15144] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 454.348180][T15146] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:05 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 17:00:05 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) [ 454.403354][ T3903] buffer_io_error: 16 callbacks suppressed [ 454.403372][ T3903] Buffer I/O error on dev loop3, logical block 1, async page read [ 454.423198][ T3903] Buffer I/O error on dev loop3, logical block 2, async page read [ 454.437637][ T3903] Buffer I/O error on dev loop3, logical block 3, async page read [ 454.445681][ T3903] Buffer I/O error on dev loop3, logical block 4, async page read 17:00:05 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) 17:00:05 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r1, &(0x7f0000000a80)=""/66, 0x42) 17:00:05 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) [ 454.456673][ T3903] Buffer I/O error on dev loop3, logical block 5, async page read [ 454.464953][ T3903] Buffer I/O error on dev loop3, logical block 6, async page read [ 454.475338][ T3903] Buffer I/O error on dev loop3, logical block 7, async page read 17:00:05 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) 17:00:05 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) 17:00:05 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:05 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) 17:00:05 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 454.967617][T15162] loop4: detected capacity change from 0 to 24 [ 454.979452][T15162] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 455.001341][T15166] loop1: detected capacity change from 0 to 24 17:00:05 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:05 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:05 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) 17:00:05 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:05 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 455.181280][T15173] loop4: detected capacity change from 0 to 24 [ 455.184357][T15172] loop5: detected capacity change from 0 to 24 [ 455.206099][T15174] loop1: detected capacity change from 0 to 24 [ 455.220281][T15173] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 455.250807][T15176] loop2: detected capacity change from 0 to 24 17:00:06 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r1, &(0x7f0000000a80)=""/66, 0x42) 17:00:06 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) 17:00:06 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:06 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:06 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:06 executing program 3: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) [ 455.401199][T15184] loop2: detected capacity change from 0 to 24 [ 455.407431][T15182] loop5: detected capacity change from 0 to 24 [ 455.414647][T15183] loop1: detected capacity change from 0 to 24 17:00:06 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:06 executing program 3: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) 17:00:06 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:06 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 455.495660][T15193] loop3: detected capacity change from 0 to 24 [ 455.534899][T15195] loop5: detected capacity change from 0 to 24 [ 455.633579][T15197] loop2: detected capacity change from 0 to 24 17:00:06 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:06 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 456.027245][T15201] loop1: detected capacity change from 0 to 24 [ 456.028487][T15200] loop3: detected capacity change from 0 to 24 [ 456.060710][T15200] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:06 executing program 0: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, &(0x7f0000000a80)=""/66, 0x42) 17:00:06 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:06 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b", 0x31, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:06 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:06 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 456.286532][T15207] loop2: detected capacity change from 0 to 24 [ 456.295634][T15209] loop1: detected capacity change from 0 to 24 [ 456.305536][T15210] loop4: detected capacity change from 0 to 24 [ 456.314158][T15208] loop5: detected capacity change from 0 to 24 [ 456.324729][T15207] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:07 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) 17:00:07 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) [ 456.339335][T15210] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:07 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 456.403381][T15214] loop5: detected capacity change from 0 to 24 17:00:07 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 456.447412][ T3902] blk_print_req_error: 28 callbacks suppressed [ 456.447431][ T3902] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 456.465107][T15217] loop1: detected capacity change from 0 to 24 [ 456.536206][ T3903] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 456.554637][T15221] loop5: detected capacity change from 0 to 24 17:00:07 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 456.876081][T15224] loop3: detected capacity change from 0 to 24 [ 456.885120][T15224] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:07 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:07 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:07 executing program 0: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, &(0x7f0000000a80)=""/66, 0x42) [ 457.139919][T15227] loop2: detected capacity change from 0 to 24 [ 457.149128][T15227] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 457.171063][T15229] loop4: detected capacity change from 0 to 24 [ 457.184510][T15229] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:08 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:08 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 457.387281][T15235] loop1: detected capacity change from 0 to 24 [ 457.394557][T15235] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 457.493364][ T3902] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 457.505549][T15238] loop5: detected capacity change from 0 to 24 [ 457.506063][ T3902] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 457.520900][ T3902] Buffer I/O error on dev loop5, logical block 0, async page read [ 457.529190][T15238] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:08 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b", 0x31, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 457.724583][T15241] loop3: detected capacity change from 0 to 24 [ 457.732222][T15241] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:08 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:08 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:08 executing program 0: pipe(0x0) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 457.991173][T15244] loop2: detected capacity change from 0 to 24 [ 458.004859][T15244] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:08 executing program 0: pipe(0x0) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) 17:00:08 executing program 0: pipe(0x0) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) 17:00:08 executing program 0: pipe(&(0x7f0000000a00)) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 458.039388][T15246] loop4: detected capacity change from 0 to 24 [ 458.058813][T15246] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:08 executing program 0: pipe(&(0x7f0000000a00)) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) 17:00:08 executing program 0: pipe(&(0x7f0000000a00)) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) 17:00:08 executing program 0: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, 0x0, 0x0) 17:00:08 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640), 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 458.238546][T15264] loop1: detected capacity change from 0 to 24 [ 458.246427][T15264] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:09 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 458.359995][T15267] loop5: detected capacity change from 0 to 24 [ 458.367546][T15267] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:09 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640), 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 458.574498][T15270] loop3: detected capacity change from 0 to 24 [ 458.581840][T15270] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:09 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:09 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:09 executing program 0: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, 0x0, 0x0) 17:00:09 executing program 0: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r0, 0x0, 0x0) [ 458.842906][T15273] loop2: detected capacity change from 0 to 24 [ 458.851552][T15273] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:09 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 458.895249][T15277] loop4: detected capacity change from 0 to 24 [ 458.910187][T15277] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 458.973633][T15281] loop0: detected capacity change from 0 to 24 [ 458.981095][T15281] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:09 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 459.094482][T15285] loop1: detected capacity change from 0 to 24 [ 459.104440][T15285] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:09 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 459.212428][T15287] loop5: detected capacity change from 0 to 24 [ 459.219822][T15287] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:10 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 459.423638][T15290] loop3: detected capacity change from 0 to 24 17:00:10 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:10 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) 17:00:10 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 459.694079][T15293] loop2: detected capacity change from 0 to 24 [ 459.701679][T15293] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:10 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 459.769605][T15298] loop4: detected capacity change from 0 to 24 [ 459.778412][T15298] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 459.828345][T15300] loop0: detected capacity change from 0 to 24 [ 459.839507][T15300] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:10 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 459.945755][T15304] loop1: detected capacity change from 0 to 24 [ 459.953537][T15304] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:10 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) 17:00:10 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)) 17:00:10 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 460.094322][T15309] loop5: detected capacity change from 0 to 24 [ 460.102056][T15309] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=01969dc4) [ 460.157775][T15311] loop5: detected capacity change from 0 to 24 [ 460.166266][T15311] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:10 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 460.375397][ T3903] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 460.386899][T15313] loop3: detected capacity change from 0 to 24 [ 460.396182][T15313] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:11 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:11 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 460.565834][T15316] loop2: detected capacity change from 0 to 24 [ 460.583571][T15316] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:11 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 460.621476][T15318] loop4: detected capacity change from 0 to 24 [ 460.636877][T15318] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 460.678139][T15320] loop0: detected capacity change from 0 to 24 [ 460.690407][T15320] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:11 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 460.793589][T15325] loop1: detected capacity change from 0 to 24 [ 460.801949][T15325] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:11 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 461.011445][T15328] loop5: detected capacity change from 0 to 24 [ 461.019205][T15328] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=6aa3b6cc) 17:00:11 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 461.240260][T15331] loop3: detected capacity change from 0 to 24 [ 461.248975][T15331] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=01969dc4) 17:00:12 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:12 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 461.415131][T15333] loop2: detected capacity change from 0 to 24 [ 461.424425][T15333] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:12 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 461.477018][T15335] loop4: detected capacity change from 0 to 24 [ 461.527349][T15338] loop0: detected capacity change from 0 to 24 [ 461.535595][T15338] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=6aa3b6cc) 17:00:12 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 461.646588][T15342] loop1: detected capacity change from 0 to 24 [ 461.654879][T15342] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=01969dc4) 17:00:12 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 461.860453][T15345] loop5: detected capacity change from 0 to 24 [ 461.867759][T15345] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=01969dc4) 17:00:12 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4", 0x60, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 462.093448][T15348] loop3: detected capacity change from 0 to 24 [ 462.103582][T15348] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:12 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:12 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 462.267436][T15351] loop2: detected capacity change from 0 to 24 [ 462.276146][T15351] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 462.393682][T15354] loop0: detected capacity change from 0 to 24 [ 462.401018][T15354] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 462.423798][ T3902] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 462.432502][T15356] loop4: detected capacity change from 0 to 24 17:00:13 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 462.434918][ T3902] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 462.448817][ T3902] Buffer I/O error on dev loop4, logical block 0, async page read [ 462.506039][T15359] loop1: detected capacity change from 0 to 24 [ 462.514264][T15359] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:13 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 462.715069][T15362] loop5: detected capacity change from 0 to 24 [ 462.724733][T15362] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:13 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:13 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 463.000525][T15367] loop3: detected capacity change from 0 to 24 17:00:13 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 463.128323][T15370] loop2: detected capacity change from 0 to 24 [ 463.136833][T15370] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 463.231535][T15373] loop0: detected capacity change from 0 to 24 [ 463.240561][T15373] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:13 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:14 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 463.348104][T15376] loop1: detected capacity change from 0 to 24 [ 463.384861][ T3604] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 463.396058][T15378] loop4: detected capacity change from 0 to 24 [ 463.404854][T15378] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:14 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 463.561926][T15382] loop5: detected capacity change from 0 to 24 [ 463.571792][T15382] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:14 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:14 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 463.957069][ T3903] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 463.972062][T15385] loop3: detected capacity change from 0 to 24 [ 463.983175][ T3903] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 463.994500][ T3903] Buffer I/O error on dev loop3, logical block 0, async page read [ 464.002008][T15387] loop2: detected capacity change from 0 to 24 [ 464.005010][T15385] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 464.017344][T15387] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=6aa3b6cc) 17:00:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 464.093069][T15389] loop0: detected capacity change from 0 to 24 [ 464.113924][T15389] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=6aa3b6cc) 17:00:14 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x0, 0x0) 17:00:14 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x0, 0x0) 17:00:14 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:15 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 464.325771][ T3604] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 464.360240][T15398] loop4: detected capacity change from 0 to 24 [ 464.367835][T15398] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:15 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:15 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 464.434621][T15400] loop5: detected capacity change from 0 to 24 [ 464.455075][T15400] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 464.499931][T15405] loop1: detected capacity change from 0 to 24 [ 464.512150][T15405] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=6aa3b6cc) 17:00:15 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:15 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:15 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 464.820842][T15409] loop3: detected capacity change from 0 to 24 [ 464.843920][T15411] loop2: detected capacity change from 0 to 8 [ 464.856988][T15409] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=6aa3b6cc) 17:00:15 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 464.893460][T15413] loop2: detected capacity change from 0 to 24 [ 464.901016][T15413] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:15 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 464.940240][T15415] loop0: detected capacity change from 0 to 8 [ 465.004371][T15419] loop0: detected capacity change from 0 to 24 [ 465.012729][T15419] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:15 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:15 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 465.193467][T15421] loop4: detected capacity change from 0 to 24 [ 465.201425][T15421] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=01969dc4) 17:00:15 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 465.260420][T15423] loop5: detected capacity change from 0 to 24 [ 465.274153][T15423] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 465.329191][T15426] loop1: detected capacity change from 0 to 24 [ 465.339747][T15426] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:16 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb4536", 0x5b, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:16 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 465.680027][T15429] loop3: detected capacity change from 0 to 24 [ 465.688250][T15429] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:16 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4", 0x60, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 465.745642][T15431] loop2: detected capacity change from 0 to 24 17:00:16 executing program 0: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 465.807442][T15434] loop2: detected capacity change from 0 to 24 [ 465.818045][T15434] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:16 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 465.848576][T15436] loop0: detected capacity change from 0 to 24 17:00:16 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 465.956102][ T3902] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 465.973447][T15439] loop0: detected capacity change from 0 to 24 [ 465.981665][T15439] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=01969dc4) 17:00:16 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 466.041722][T15441] loop4: detected capacity change from 0 to 24 [ 466.053144][T15441] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=01969dc4) 17:00:16 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 466.121522][T15444] loop5: detected capacity change from 0 to 24 [ 466.130119][T15444] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:16 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26", 0x54, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 466.185040][T15447] loop1: detected capacity change from 0 to 24 [ 466.196228][T15447] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 466.250525][T15450] loop1: detected capacity change from 0 to 24 [ 466.258714][T15450] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:17 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c", 0x55, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 466.526844][T15452] loop3: detected capacity change from 0 to 24 [ 466.535379][T15452] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:17 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 466.655695][T15455] loop2: detected capacity change from 0 to 24 [ 466.667082][T15455] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:17 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)) [ 466.824573][T15458] loop0: detected capacity change from 0 to 24 [ 466.831931][T15458] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:17 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:17 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 466.893270][T15462] loop4: detected capacity change from 0 to 24 [ 466.893437][T15460] loop0: detected capacity change from 0 to 24 [ 466.900876][T15462] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 466.927115][T15460] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 466.968507][T15464] loop5: detected capacity change from 0 to 24 [ 466.976978][T15464] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 466.996529][T15468] loop0: detected capacity change from 0 to 24 [ 467.012025][T15468] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 467.015607][T15466] loop4: detected capacity change from 0 to 24 [ 467.034152][T15466] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:17 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 467.097897][T15472] loop1: detected capacity change from 0 to 24 [ 467.117217][T15472] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:18 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d970", 0x5e, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 467.381782][T15476] loop3: detected capacity change from 0 to 24 [ 467.389407][T15476] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:18 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 467.505162][T15479] loop2: detected capacity change from 0 to 24 [ 467.514520][T15479] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:18 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:18 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb4536", 0x5b, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 467.844958][T15482] loop5: detected capacity change from 0 to 24 [ 467.854552][T15486] loop0: detected capacity change from 0 to 24 [ 467.859677][T15482] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 467.862102][T15486] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 467.883043][T15484] loop4: detected capacity change from 0 to 24 [ 467.891682][T15484] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:18 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 467.916229][ T3903] I/O error, dev loop0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 467.925503][ T3903] Buffer I/O error on dev loop0, logical block 1, async page read [ 467.938648][ T3903] I/O error, dev loop0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 467.948239][ T3903] Buffer I/O error on dev loop0, logical block 2, async page read [ 467.962642][ T3903] I/O error, dev loop0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 467.978427][ T3903] Buffer I/O error on dev loop0, logical block 3, async page read [ 467.985829][T15488] loop1: detected capacity change from 0 to 24 [ 467.986744][ T3903] I/O error, dev loop0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 468.003494][ T3903] Buffer I/O error on dev loop0, logical block 4, async page read [ 468.011601][ T3903] I/O error, dev loop0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 468.021166][ T3903] Buffer I/O error on dev loop0, logical block 5, async page read [ 468.030974][ T3903] I/O error, dev loop0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 468.031761][T15488] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 468.041117][ T3903] Buffer I/O error on dev loop0, logical block 6, async page read [ 468.057393][ T3903] I/O error, dev loop0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 468.066712][ T3903] Buffer I/O error on dev loop0, logical block 7, async page read 17:00:18 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 468.230398][T15495] loop3: detected capacity change from 0 to 24 [ 468.237923][T15495] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:19 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6", 0x49, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 468.356846][T15498] loop2: detected capacity change from 0 to 24 [ 468.364300][T15498] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:19 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:19 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:19 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b", 0x31, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 468.680058][T15501] loop5: detected capacity change from 0 to 24 [ 468.717108][T15501] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 468.729077][T15503] loop4: detected capacity change from 0 to 24 [ 468.741001][T15503] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 468.744854][T15505] loop0: detected capacity change from 0 to 24 [ 468.760041][T15505] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:19 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c", 0x55, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 468.844218][T15509] loop1: detected capacity change from 0 to 24 [ 468.856784][T15509] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:19 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8", 0x30, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 469.085580][T15513] loop3: detected capacity change from 0 to 24 [ 469.094738][T15513] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:19 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c", 0x55, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 469.205883][T15515] loop2: detected capacity change from 0 to 24 [ 469.214737][T15515] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:20 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:20 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:20 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8", 0x30, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 469.530574][T15518] loop5: detected capacity change from 0 to 24 [ 469.539043][T15518] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 469.591773][T15520] loop4: detected capacity change from 0 to 24 [ 469.603428][T15520] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 469.607774][T15523] loop0: detected capacity change from 0 to 24 [ 469.627048][T15523] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:20 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8", 0x30, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 469.715845][T15526] loop1: detected capacity change from 0 to 24 [ 469.725535][T15526] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:20 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 469.939312][T15530] loop3: detected capacity change from 0 to 24 [ 469.947337][T15530] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:20 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) 17:00:20 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:20 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 470.073239][T15534] loop2: detected capacity change from 0 to 24 [ 470.081027][T15534] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:20 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 470.135967][T15536] loop2: detected capacity change from 0 to 24 [ 470.143599][T15536] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 470.214076][T15538] loop2: detected capacity change from 0 to 24 [ 470.221967][T15538] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:21 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:21 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640), 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 470.385081][T15540] loop5: detected capacity change from 0 to 24 [ 470.393221][T15540] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:21 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640), 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 470.433350][T15542] loop4: detected capacity change from 0 to 24 [ 470.450134][T15542] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 470.486431][T15544] loop0: detected capacity change from 0 to 24 [ 470.494568][T15544] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:21 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 470.566285][T15547] loop1: detected capacity change from 0 to 24 [ 470.576360][T15547] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:21 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 470.797632][T15550] loop3: detected capacity change from 0 to 24 [ 470.807046][T15550] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:21 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26", 0x54, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 471.065934][T15553] loop2: detected capacity change from 0 to 24 [ 471.075801][T15553] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:21 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:21 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {0x0, 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 471.237781][T15556] loop5: detected capacity change from 0 to 24 [ 471.245619][T15556] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:21 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 471.287907][T15558] loop4: detected capacity change from 0 to 24 [ 471.296598][T15558] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 471.328850][T15561] loop0: detected capacity change from 0 to 24 [ 471.337829][T15561] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:22 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {0x0, 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 471.418441][T15564] loop1: detected capacity change from 0 to 24 [ 471.426253][T15564] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:22 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 471.641100][T15567] loop3: detected capacity change from 0 to 24 [ 471.648829][T15567] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:22 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 471.920750][T15569] loop2: detected capacity change from 0 to 24 [ 471.928935][T15569] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:22 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:22 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) [ 472.083363][T15571] loop5: detected capacity change from 0 to 24 [ 472.091454][T15571] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:22 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x2, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 472.142046][T15573] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 472.179780][T15575] loop0: detected capacity change from 0 to 24 17:00:22 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640), 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 472.195305][T15575] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 472.233011][T15578] loop4: detected capacity change from 0 to 24 17:00:22 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 472.240984][T15578] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 472.282608][T15580] loop1: detected capacity change from 0 to 24 [ 472.291249][T15580] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:23 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8", 0x30, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 472.492910][T15586] loop3: detected capacity change from 0 to 24 [ 472.500710][T15586] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:23 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 472.779864][T15589] loop2: detected capacity change from 0 to 24 [ 472.788018][T15589] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:23 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 472.937111][T15591] loop5: detected capacity change from 0 to 24 [ 472.947201][T15591] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:23 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x2, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:23 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640), 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 473.037203][T15593] loop0: detected capacity change from 0 to 24 [ 473.046193][T15593] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 17:00:23 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 473.079707][T15595] loop4: detected capacity change from 0 to 24 [ 473.087935][T15595] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:23 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) [ 473.132440][T15598] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:23 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:23 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:24 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8", 0x30, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:24 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 473.347059][T15606] loop3: detected capacity change from 0 to 24 [ 473.357805][T15606] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 473.378494][T15608] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 473.444596][T15610] loop1: detected capacity change from 0 to 24 [ 473.452093][T15610] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=663ec086) 17:00:24 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 473.629464][T15613] loop2: detected capacity change from 0 to 24 [ 473.636945][T15613] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=663ec086) 17:00:24 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 473.780610][T15615] loop5: detected capacity change from 0 to 24 [ 473.789329][T15615] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:24 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:24 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:24 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 473.883365][T15618] loop0: detected capacity change from 0 to 8 [ 473.890838][T15618] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 473.930719][T15620] loop4: detected capacity change from 0 to 24 [ 473.940169][T15620] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 473.958841][T15622] loop0: detected capacity change from 0 to 24 [ 473.966765][T15622] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=01969dc4) 17:00:24 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 474.199500][T15626] loop3: detected capacity change from 0 to 24 [ 474.207934][T15626] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:24 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:25 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 474.291440][T15629] loop1: detected capacity change from 0 to 24 [ 474.324355][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 17:00:25 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 474.348243][T15631] loop1: detected capacity change from 0 to 24 17:00:25 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 474.390820][T15633] loop1: detected capacity change from 0 to 24 17:00:25 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:25 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:25 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 474.478153][T15635] loop2: detected capacity change from 0 to 24 [ 474.487385][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 474.508169][T15637] loop1: detected capacity change from 0 to 24 17:00:25 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 474.595832][ T3903] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 474.615320][T15639] loop1: detected capacity change from 0 to 24 [ 474.628948][ T3902] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 474.641534][T15639] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=663ec086) [ 474.663061][T15641] loop2: detected capacity change from 0 to 24 [ 474.664477][T15643] loop5: detected capacity change from 0 to 24 [ 474.685468][T15643] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=663ec086) [ 474.699669][T15641] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=663ec086) 17:00:25 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:25 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:25 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 474.819349][T15647] loop4: detected capacity change from 0 to 24 [ 474.840188][T15647] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 474.840827][T15649] loop0: detected capacity change from 0 to 24 [ 474.868997][T15649] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=01969dc4) [ 474.913657][T15651] loop4: detected capacity change from 0 to 24 [ 474.933263][T15651] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:25 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:25 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:25 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 475.049319][T15656] loop3: detected capacity change from 0 to 24 [ 475.057151][T15656] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 475.071109][T15655] loop4: detected capacity change from 0 to 24 [ 475.089385][T15655] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:25 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 475.126803][T15658] loop3: detected capacity change from 0 to 24 [ 475.137209][T15658] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:25 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:25 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 475.180375][T15661] loop4: detected capacity change from 0 to 24 [ 475.190640][T15661] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 475.237556][T15663] loop3: detected capacity change from 0 to 24 [ 475.261497][T15665] loop4: detected capacity change from 0 to 24 [ 475.265832][T15663] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=663ec086) [ 475.276871][T15665] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=663ec086) 17:00:26 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:26 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:26 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:26 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 475.513364][T15669] loop1: detected capacity change from 0 to 24 [ 475.520089][T15673] loop5: detected capacity change from 0 to 24 [ 475.525215][T15672] loop2: detected capacity change from 0 to 24 [ 475.535179][T15672] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 475.540713][T15673] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 475.546009][T15669] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:26 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)) 17:00:26 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 475.623666][T15675] loop5: detected capacity change from 0 to 24 [ 475.631450][T15675] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:26 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 475.684142][T15679] loop0: detected capacity change from 0 to 24 [ 475.691680][T15679] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 475.729393][T15681] loop5: detected capacity change from 0 to 24 [ 475.737220][T15681] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 475.763454][ T3903] I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 475.770631][T15683] loop0: detected capacity change from 0 to 24 17:00:26 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 475.782702][T15683] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 475.791425][ T3903] Buffer I/O error on dev loop5, logical block 1, async page read [ 475.801769][ T3903] I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 475.811239][ T3903] Buffer I/O error on dev loop5, logical block 2, async page read [ 475.821673][ T3903] I/O error, dev loop5, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 475.832477][ T3902] I/O error, dev loop0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 475.834558][ T3903] Buffer I/O error on dev loop5, logical block 3, async page read [ 475.841602][ T3902] Buffer I/O error on dev loop0, logical block 1, async page read [ 475.841650][ T3902] I/O error, dev loop0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 475.849780][ T3903] I/O error, dev loop5, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 475.861295][ T3902] Buffer I/O error on dev loop0, logical block 2, async page read [ 475.870910][ T3903] Buffer I/O error on dev loop5, logical block 4, async page read [ 475.876276][ T3902] Buffer I/O error on dev loop0, logical block 3, async page read [ 475.883673][T15685] loop5: detected capacity change from 0 to 24 [ 475.893393][ T3902] Buffer I/O error on dev loop0, logical block 4, async page read [ 475.901631][ T3903] Buffer I/O error on dev loop5, logical block 5, async page read [ 475.924732][ T3902] Buffer I/O error on dev loop0, logical block 5, async page read [ 475.925812][T15685] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:26 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{0x0, 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:26 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326", 0xb, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 476.087512][T15688] loop3: detected capacity change from 0 to 24 [ 476.099114][T15688] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 476.128498][T15690] loop4: detected capacity change from 0 to 24 [ 476.136136][T15690] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:26 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326", 0xb, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:27 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 476.335584][T15693] loop1: detected capacity change from 0 to 24 [ 476.344398][T15693] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 476.371257][T15695] loop2: detected capacity change from 0 to 24 [ 476.380273][T15695] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:27 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:27 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 476.619097][T15698] loop0: detected capacity change from 0 to 24 [ 476.632628][T15698] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 476.694868][T15700] loop5: detected capacity change from 0 to 24 [ 476.707068][T15700] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:27 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326", 0xb, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:27 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{0x0, 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 476.935777][T15704] loop3: detected capacity change from 0 to 24 [ 476.947416][T15704] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 476.976844][T15706] loop4: detected capacity change from 0 to 24 [ 476.984341][T15706] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:27 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:27 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 477.181984][T15710] loop1: detected capacity change from 0 to 24 [ 477.190559][T15710] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 477.224724][T15712] loop2: detected capacity change from 0 to 24 [ 477.234024][T15712] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:28 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:28 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 477.474619][T15715] loop0: detected capacity change from 0 to 24 [ 477.485007][T15715] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 477.533252][T15717] loop5: detected capacity change from 0 to 24 [ 477.540327][T15717] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:28 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:28 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 477.786331][T15721] loop3: detected capacity change from 0 to 24 [ 477.795865][T15721] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 477.827187][T15723] loop4: detected capacity change from 0 to 24 [ 477.835999][T15723] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:28 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:28 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 478.034922][T15726] loop1: detected capacity change from 0 to 24 [ 478.043623][T15726] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 478.073046][T15728] loop2: detected capacity change from 0 to 24 [ 478.080086][T15728] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=01969dc4) 17:00:28 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:29 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 478.320824][T15732] loop0: detected capacity change from 0 to 24 [ 478.329547][T15732] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=01969dc4) [ 478.393056][T15734] loop5: detected capacity change from 0 to 24 [ 478.400509][T15734] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:29 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:29 executing program 4: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 478.637716][T15738] loop3: detected capacity change from 0 to 24 [ 478.645096][T15738] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=01969dc4) 17:00:29 executing program 4: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 478.679516][T15740] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:29 executing program 4: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 478.738785][T15743] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:29 executing program 4: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 478.800026][T15745] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:29 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09", 0x9, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:29 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896", 0x6, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 478.886118][T15747] loop1: detected capacity change from 0 to 24 [ 478.898759][T15749] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 478.921151][T15747] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:29 executing program 4: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 478.953552][T15751] loop2: detected capacity change from 0 to 24 17:00:29 executing program 4: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 478.994984][T15751] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 479.019579][T15753] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:29 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 479.087843][T15756] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:29 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:29 executing program 5: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}]}) [ 479.177182][T15759] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 479.182728][T15760] loop0: detected capacity change from 0 to 24 [ 479.193516][T15760] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 479.265901][T15762] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:30 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:30 executing program 4: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:30 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:30 executing program 4: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 479.481373][T15767] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 479.496250][T15769] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:30 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 479.590819][T15771] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:30 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:30 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896", 0x6, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:30 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:30 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:30 executing program 4: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 479.780984][T15777] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 479.793053][T15780] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 479.803383][T15783] loop2: detected capacity change from 0 to 24 [ 479.811279][T15783] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:30 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:30 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:30 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:30 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:30 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:30 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:30 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 480.031836][T15788] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 480.046633][T15790] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 480.056793][T15791] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:30 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 480.111763][T15793] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 480.134636][T15797] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:31 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:31 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:31 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d82", 0x5f, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:31 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:31 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:31 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:31 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:31 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:31 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:31 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 480.659947][T15805] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 480.665991][T15806] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 480.684703][T15808] loop1: detected capacity change from 0 to 24 [ 480.691676][T15808] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:31 executing program 2: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, 0x0) 17:00:31 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:31 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 480.757689][T15815] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 480.767858][T15817] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:31 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:32 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, 0x0) 17:00:32 executing program 3: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:32 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:32 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 481.515506][T15835] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 481.521059][T15832] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 481.545993][T15837] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:32 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, 0x0) 17:00:32 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:32 executing program 3: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:32 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:32 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 481.615341][T15842] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 481.629959][T15844] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:32 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:32 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 3: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:32 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 481.687675][T15854] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 481.696875][T15856] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:32 executing program 0: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:32 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 481.773552][T15867] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:32 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:32 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 0: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 481.830743][T15874] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 481.867178][T15878] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:32 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:32 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 0: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:32 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 481.948429][T15889] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:32 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 482.020226][T15896] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 482.030079][T15899] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:32 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) 17:00:32 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) 17:00:32 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) 17:00:32 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 482.174363][T15920] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 482.189070][T15922] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 482.200630][T15924] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:32 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:32 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) 17:00:32 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:32 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) [ 482.289369][T15932] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 482.324690][T15941] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) 17:00:33 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 482.405172][T15948] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}]}) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 482.485634][T15956] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 482.510191][T15966] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) [ 482.542026][T15970] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 482.635876][T15974] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 482.667172][T15980] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}]}) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 4: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 482.705464][T15982] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 482.735573][T15988] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) [ 482.800948][T15996] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 482.819898][T15998] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 482.830704][T16000] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}]}) 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}]}) 17:00:33 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 482.877728][T16006] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 482.917207][T16012] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:33 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 482.968145][T16017] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 482.999299][T16020] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}]}) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}]}) 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) [ 483.040980][T16026] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.051411][T16028] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 483.107943][T16032] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 483.132791][T16036] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.139382][T16038] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}]}) 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 483.151136][T16040] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:33 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:33 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}]}) [ 483.198849][T16044] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:33 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:33 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}]}) 17:00:33 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 483.244063][T16046] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.269700][T16048] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.284998][T16051] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}]}) [ 483.300353][T16055] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 483.301771][T16052] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 483.381341][T16060] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.403900][T16059] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.415306][T16065] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.415919][T16064] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 4: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}]}) 17:00:34 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 4: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 483.490724][T16070] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.513890][T16076] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.516599][T16077] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 483.535233][T16078] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 17:00:34 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}]}) 17:00:34 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 4: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) [ 483.629926][T16087] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.637083][T16085] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 483.639587][T16090] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.666406][T16092] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:34 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 483.767001][T16100] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 483.783884][T16103] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 483.787950][T16104] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.794541][T16106] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:34 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 483.897546][T16115] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 483.900286][T16116] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 483.910531][T16112] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 483.931004][T16118] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}]}) [ 484.005264][T16125] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.015038][T16127] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 484.029518][T16128] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 484.053347][T16132] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:34 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:34 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 484.133626][T16135] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.163165][T16136] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 484.165977][T16141] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}]}) 17:00:34 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) [ 484.181107][T16142] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.190286][T16143] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 484.223046][T16147] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:34 executing program 3: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:34 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:34 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:35 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}]}) 17:00:35 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}]}) 17:00:35 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 484.336958][T16162] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.337597][T16161] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.346706][T16156] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.362759][T16160] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:35 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:35 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:35 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 484.442593][T16166] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.458110][T16169] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.459277][T16170] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.483858][T16172] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:35 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}]}) [ 484.518869][T16178] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.519597][T16176] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:35 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:35 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:35 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:35 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 484.562116][T16180] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 484.584898][T16182] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:35 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:35 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) [ 484.635756][T16184] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.650469][T16187] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 484.671645][T16190] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:35 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}]}) 17:00:35 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:35 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:35 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:35 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) [ 484.750624][T16196] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.771044][T16199] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 484.774923][T16202] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}]}) 17:00:35 executing program 3: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:35 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) 17:00:35 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 484.798552][T16204] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:35 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:35 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 484.873809][T16209] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 484.903185][T16214] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:00:35 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}]}) 17:00:35 executing program 3: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:35 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 484.918029][T16216] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 484.942787][T16220] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 17:00:35 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)) [ 484.966294][T16222] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:35 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:35 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:35 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) [ 485.008553][T16227] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 485.038819][T16228] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:35 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}]}) 17:00:35 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896", 0x6, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:35 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896", 0x6, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:35 executing program 2: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:35 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26", 0x54, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:35 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 485.142617][T16241] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 485.158676][T16242] loop0: detected capacity change from 0 to 24 [ 485.172102][T16245] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 485.186790][T16242] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 485.191607][T16246] loop3: detected capacity change from 0 to 24 [ 485.210461][T16246] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 485.211464][T16250] loop1: detected capacity change from 0 to 1 [ 485.229035][T16248] loop5: detected capacity change from 0 to 24 17:00:35 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 485.238653][T16248] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 485.250245][T16250] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 485.260781][ T3903] blk_print_req_error: 27 callbacks suppressed [ 485.260797][ T3903] I/O error, dev loop0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 17:00:35 executing program 2: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 485.289011][ T3903] buffer_io_error: 23 callbacks suppressed [ 485.289025][ T3903] Buffer I/O error on dev loop0, logical block 1, async page read [ 485.289584][T16254] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 485.302399][ T3903] I/O error, dev loop0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.327416][ T3903] Buffer I/O error on dev loop0, logical block 2, async page read 17:00:36 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 485.348875][T16256] loop2: detected capacity change from 0 to 1 [ 485.350256][ T3903] I/O error, dev loop0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.373687][T16256] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 485.376499][ T3903] Buffer I/O error on dev loop0, logical block 3, async page read [ 485.388047][T16260] loop1: detected capacity change from 0 to 1 17:00:36 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 485.390157][ T3903] I/O error, dev loop0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.408551][ T3903] Buffer I/O error on dev loop0, logical block 4, async page read [ 485.418371][ T3903] I/O error, dev loop0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.432484][T16260] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 485.438075][ T3903] Buffer I/O error on dev loop0, logical block 5, async page read [ 485.454210][ T3903] I/O error, dev loop0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.467409][T16262] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 485.476239][ T3903] Buffer I/O error on dev loop0, logical block 6, async page read [ 485.492128][ T3903] I/O error, dev loop0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 17:00:36 executing program 2: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:36 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:36 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 485.502211][ T3903] Buffer I/O error on dev loop0, logical block 7, async page read [ 485.575906][T16265] loop1: detected capacity change from 0 to 1 [ 485.577987][T16266] loop2: detected capacity change from 0 to 8 [ 485.592082][T16265] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 485.595052][T16266] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=7c423172) [ 485.601948][T16268] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 485.642407][ T3903] I/O error, dev loop2, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.653651][ T3903] Buffer I/O error on dev loop2, logical block 1, async page read [ 485.667424][ T3903] I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.684739][ T3903] Buffer I/O error on dev loop2, logical block 2, async page read [ 485.702240][ T3903] I/O error, dev loop2, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 485.715785][ T3903] Buffer I/O error on dev loop2, logical block 3, async page read 17:00:36 executing program 3: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:36 executing program 2: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:00:36 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:36 executing program 5: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:36 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:36 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 486.021819][T16271] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 486.030976][T16272] loop1: detected capacity change from 0 to 1 17:00:36 executing program 2: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 486.064745][T16276] loop0: detected capacity change from 0 to 24 [ 486.066491][T16275] loop4: detected capacity change from 0 to 24 [ 486.085189][T16272] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:36 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:36 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 486.129964][T16275] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 486.137401][T16280] loop5: detected capacity change from 0 to 24 [ 486.139033][T16279] loop3: detected capacity change from 0 to 24 [ 486.149263][T16282] loop2: detected capacity change from 0 to 24 [ 486.211162][T16282] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=7c423172) [ 486.237859][T16285] loop0: detected capacity change from 0 to 24 17:00:36 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e03", 0x5d, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:36 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:36 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 486.269767][T16287] loop1: detected capacity change from 0 to 1 [ 486.276022][T16285] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 486.279655][T16287] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:37 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 486.331745][T16289] loop2: detected capacity change from 0 to 24 [ 486.346502][T16289] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 486.407778][T16293] loop5: detected capacity change from 0 to 24 [ 486.413850][T16292] loop3: detected capacity change from 0 to 24 [ 486.436875][T16295] loop1: detected capacity change from 0 to 1 [ 486.451869][T16293] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 486.475981][T16292] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=7c423172) [ 486.485619][T16295] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:37 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:37 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 486.599337][T16301] loop1: detected capacity change from 0 to 1 [ 486.612271][T16300] loop3: detected capacity change from 0 to 24 [ 486.628083][T16301] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:37 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 486.648114][T16300] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 486.736902][T16303] loop1: detected capacity change from 0 to 1 17:00:37 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:37 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:37 executing program 1: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 486.899701][T16305] loop1: detected capacity change from 0 to 1 [ 486.938422][T16307] loop4: detected capacity change from 0 to 24 [ 486.961632][T16307] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:37 executing program 0: syz_mount_image$bfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:37 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 487.015688][T16309] loop1: detected capacity change from 0 to 1 [ 487.069623][T16311] loop0: detected capacity change from 0 to 1 [ 487.158469][T16313] loop1: detected capacity change from 0 to 1 17:00:37 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:37 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:37 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:37 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 487.291465][T16319] loop1: detected capacity change from 0 to 1 [ 487.303901][T16320] loop5: detected capacity change from 0 to 24 [ 487.304971][T16317] loop2: detected capacity change from 0 to 24 [ 487.310352][T16321] loop0: detected capacity change from 0 to 24 [ 487.318922][T16317] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 487.333390][T16320] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=7c423172) [ 487.371783][T16321] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=7c423172) 17:00:38 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:38 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:38 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 487.514963][T16326] loop5: detected capacity change from 0 to 24 [ 487.523143][T16324] loop3: detected capacity change from 0 to 24 [ 487.527892][T16328] loop0: detected capacity change from 0 to 24 [ 487.555545][T16324] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=7c423172) [ 487.567282][T16328] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=7c423172) [ 487.568194][T16326] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=7c423172) 17:00:38 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:38 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:38 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:38 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:38 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 487.790382][T16333] loop0: detected capacity change from 0 to 24 [ 487.792919][T16336] loop1: detected capacity change from 0 to 1 [ 487.806458][T16335] loop5: detected capacity change from 0 to 24 [ 487.807040][T16334] loop3: detected capacity change from 0 to 24 [ 487.821609][T16333] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=7c423172) 17:00:38 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 487.844878][T16334] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 487.853332][T16335] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 487.869297][T16338] loop4: detected capacity change from 0 to 24 [ 487.878943][T16338] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 17:00:38 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:38 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:38 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:38 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 488.121145][T16347] loop0: detected capacity change from 0 to 24 [ 488.154394][T16347] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=7c423172) 17:00:38 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 488.233039][T16350] loop2: detected capacity change from 0 to 24 [ 488.246912][T16350] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=7c423172) [ 488.248632][T16353] loop1: detected capacity change from 0 to 1 17:00:38 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 488.279358][T16353] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 488.341001][T16355] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:39 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:39 executing program 0: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:39 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)) 17:00:39 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:39 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) 17:00:39 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {0x0, 0x0, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:39 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bc", 0x5a, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 488.705369][T16361] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 488.725224][T16364] loop2: detected capacity change from 0 to 24 [ 488.734181][T16363] loop3: detected capacity change from 0 to 24 [ 488.744031][T16365] loop5: detected capacity change from 0 to 24 [ 488.762525][T16363] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=7c423172) [ 488.778643][T16364] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=7c423172) [ 488.791001][T16365] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 488.802026][T16367] loop4: detected capacity change from 0 to 24 17:00:39 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:39 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) [ 488.835936][T16369] loop0: detected capacity change from 0 to 24 [ 488.860942][T16367] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 488.880652][T16369] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 488.895763][T16374] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:39 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 488.993628][T16377] loop2: detected capacity change from 0 to 24 [ 488.993682][T16379] loop1: detected capacity change from 0 to 1 [ 489.031986][T16377] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 489.034013][T16379] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:39 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:39 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 489.202182][T16382] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 489.295724][T16384] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:40 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8", 0x30, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:40 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:40 executing program 3: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:40 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8", 0x30, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:40 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26", 0x54, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 489.604000][T16388] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 489.605523][T16387] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 489.656398][T16390] loop5: detected capacity change from 0 to 24 [ 489.675312][T16390] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 489.694931][T16394] loop0: detected capacity change from 0 to 24 17:00:40 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:40 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000380)={@private0}, &(0x7f00000003c0)=0x14) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26bfa52389e8bca06e030d821f", 0x60, 0x4}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 489.697073][T16392] loop4: detected capacity change from 0 to 24 [ 489.722894][T16394] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 489.734942][T16397] loop1: detected capacity change from 0 to 1 [ 489.741087][T16392] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 489.747584][T16398] loop3: detected capacity change from 0 to 24 17:00:40 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174bfcab2f7b07d07294369f5e26", 0x54, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 489.768386][T16397] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 489.778853][T16398] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 17:00:40 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, 0x0) 17:00:40 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, 0x0) [ 489.838818][T16402] loop2: detected capacity change from 0 to 24 [ 489.848365][T16402] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 489.871968][T16405] loop1: detected capacity change from 0 to 1 17:00:40 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, 0x0) [ 489.972247][T16409] loop1: detected capacity change from 0 to 1 17:00:40 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 490.087373][T16411] loop1: detected capacity change from 0 to 1 [ 490.211106][T16413] loop1: detected capacity change from 0 to 1 [ 490.233821][T16413] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:41 executing program 4: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, 0x0) 17:00:41 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:41 executing program 5: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, 0x0) 17:00:41 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:41 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {0x0, 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 490.524171][T16415] loop1: detected capacity change from 0 to 1 [ 490.543424][T16417] loop5: detected capacity change from 0 to 1 [ 490.555275][T16415] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 17:00:41 executing program 1: syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000840)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 17:00:41 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x2, &(0x7f00000007c0)=[{0x0, 0x0, 0x4}, {0x0}], 0x0, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}], [{@appraise}]}) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000a80)=""/66, 0x42) [ 490.580455][T16421] loop4: detected capacity change from 0 to 1 [ 490.620227][T16420] loop0: detected capacity change from 0 to 24 17:00:41 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {&(0x7f00000006c0)="c49d96015f9021d63cd39def16d649fb25bc462211212853b70f6b1654a37b962c1845f035c5758b433f626131b9b3e8300b96e52d1a9c5e8e3c4313c407d1ad7fd698d72edc174b", 0x48, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}, {&(0x7f0000000780)="7231427c5e489f3b7da256566b124bc65f5470b3f2b70a29519429d4840c4c266eb0005d22d7c0aa57e30526b334a7bac179c47af9e5e879", 0x38, 0x7}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r3, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) 17:00:41 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x40040, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0xf5, 0x0, 0x2, 0x6b6, "59190c03008fce00ea1b7b6e92f9dbf56b66e8c405974e9b29fdb49420b27b2d132f15eede24d1d7b80ae24e4290cf0ea1ba31bdf2080b2c14c49ea490969e5b25f671f24ab15cc3db72a7de9f5b120c68eb573f50792bcaa019ab90ae1cd53337af61b35db13b4b6fe14272d2e9756346fed1c0009197a34fb481ccc474c800b4251eb8525f0f5736417440f8d8891a4cd97f01a08cfb4324938e05a959544731bc85c927d6340dfdd804aeed46a66bd919d5e41de04b0dcdf9f850ce1d899a85f791a252af9c9a52e531f448daf06450344927cf62dd21df905e11a5"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x181401, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x3) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x71, 0x0, 0x1, 0x31, "933f6ade54af89269a64d9e4de73153b04498cbf22529b6590e06540cb90159423c3755fe0c92db63204bd5c4bd5411426c7d46ff2ecedbe0e89aaaf84e7251e65798a21e6d022acbeb1079b6daeadcd10e7d1bf15cce87ddc"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x20, 0x3, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) msgget$private(0x0, 0x40a) syz_mount_image$bfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x3001, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000640)="ccb6a36a9b1d29200ee803a19fddac3d32eb85aac0bb2839e5c9e5fbfa24c4ba62e08cf09b975e21fc9f6952595904911b8f197f17d85bb217b4a7da78890d268fbab4f96e78c29ee6648a35df547a5d690b4a719c74000afb453679d97029e4d2", 0x61, 0x101}, {0x0, 0x0, 0x4}, {&(0x7f0000000740)="86c03e66a896fb8e09b326f3", 0xc, 0x84b}], 0x40, &(0x7f0000000840)={[{'/dev/vfio/vfio\x00'}, {'ip6erspan0\x00'}, {'nr0\x00'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '*$'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) read$qrtrtun(r4, &(0x7f0000000a80)=""/66, 0x42) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000b80)={0x0, 0x7, 0x2, 0xfffffffc, 0x400, 0x4, 0x3f, 0x2, 0x200, 0x7, 0x4, 0x51c}) [ 490.647749][T16423] loop3: detected capacity change from 0 to 24 [ 490.655719][T16423] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 490.657294][T16420] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 490.697465][T16426] loop1: detected capacity change from 0 to 1 [ 490.712717][ T3637] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 490.724439][ T3637] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 490.732838][ T3637] CPU: 1 PID: 3637 Comm: udevd Tainted: G W 5.17.0-syzkaller-11138-gf022814633e1 #0 [ 490.743496][ T3637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.753539][ T3637] RIP: 0010:list_lru_add+0x277/0x510 [ 490.758914][ T3637] Code: 04 64 4d 8d 7c c7 10 4c 89 3c 24 e8 a3 a6 ca ff 49 8d 47 08 48 89 c2 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 02 00 00 4d 8b 77 08 48 89 df 48 8b 14 24 4c [ 490.778511][ T3637] RSP: 0018:ffffc9000332f9d0 EFLAGS: 00010202 [ 490.784566][ T3637] RAX: dffffc0000000000 RBX: ffff88823bdf6fc0 RCX: 0000000000000000 [ 490.792527][ T3637] RDX: 0000000000000001 RSI: ffffffff81ad8bad RDI: ffffffff8db5fd10 [ 490.800492][ T3637] RBP: ffff88807fbe47f0 R08: 0000000000000000 R09: ffffffff8db5fd17 [ 490.808453][ T3637] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 490.816413][ T3637] R13: ffff88807f943080 R14: 0000000000000080 R15: 0000000000000000 [ 490.824375][ T3637] FS: 00007f7aa4bdf840(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 490.833297][ T3637] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 490.839876][ T3637] CR2: 00007fe036ea5fc8 CR3: 000000005b59a000 CR4: 00000000003506e0 [ 490.847838][ T3637] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 490.855798][ T3637] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 490.863757][ T3637] Call Trace: [ 490.867023][ T3637] [ 490.869943][ T3637] ? dput+0x35/0xdb0 [ 490.873894][ T3637] dput+0x7a7/0xdb0 [ 490.877692][ T3637] ? page_get_link+0x7b0/0x7b0 [ 490.882468][ T3637] step_into+0xcb3/0x1d80 [ 490.886789][ T3637] ? nci_unregister_device+0x1a0/0x310 [ 490.892307][ T3637] ? rcu_read_lock_sched_held+0xd/0x70 [ 490.897791][ T3637] ? lock_release+0x522/0x720 [ 490.902477][ T3637] ? lookup_open.isra.0+0x1690/0x1690 [ 490.907846][ T3637] ? up_write+0x470/0x470 [ 490.912162][ T3637] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 490.918426][ T3637] ? walk_component+0x14f/0x6a0 [ 490.923269][ T3637] walk_component+0x171/0x6a0 [ 490.927949][ T3637] ? handle_dots.part.0+0x15e0/0x15e0 [ 490.933318][ T3637] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 490.939436][ T3637] ? walk_component+0x6a0/0x6a0 [ 490.944286][ T3637] path_lookupat+0x1bb/0x860 [ 490.948907][ T3637] filename_lookup+0x1c6/0x590 [ 490.953659][ T3637] ? lock_release+0x522/0x720 [ 490.958341][ T3637] ? may_linkat+0x500/0x500 [ 490.962831][ T3637] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 490.969067][ T3637] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 490.974781][ T3637] ? __check_object_size+0x16c/0x4f0 [ 490.980112][ T3637] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 490.986348][ T3637] ? strncpy_from_user+0x287/0x3c0 [ 490.991514][ T3637] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 490.997751][ T3637] ? getname_flags.part.0+0x1dd/0x4f0 [ 491.003118][ T3637] ? projid_m_show+0x220/0x220 [ 491.007922][ T3637] user_path_at_empty+0x42/0x60 [ 491.012763][ T3637] do_faccessat+0x127/0x850 [ 491.017258][ T3637] ? stream_open+0x50/0x50 [ 491.021665][ T3637] ? syscall_enter_from_user_mode+0x21/0x70 [ 491.027580][ T3637] do_syscall_64+0x35/0xb0 [ 491.031986][ T3637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.037872][ T3637] RIP: 0033:0x7f7aa4d25bcd [ 491.042279][ T3637] Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 55 41 89 ca 41 89 cd b8 b7 01 00 00 41 54 41 89 d4 55 53 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 27 01 00 00 41 89 c0 85 c0 0f 84 f4 00 00 [ 491.061884][ T3637] RSP: 002b:00007ffcc8e48480 EFLAGS: 00000202 ORIG_RAX: 00000000000001b7 [ 491.070287][ T3637] RAX: ffffffffffffffda RBX: 00007ffcc8e49610 RCX: 00007f7aa4d25bcd [ 491.078247][ T3637] RDX: 0000000000000000 RSI: 00007f7aa5125970 RDI: 000000000000000b [ 491.086206][ T3637] RBP: 0000562d4d524eb0 R08: 0000562d4d4ee5a0 R09: 0000562d4d4c0010 [ 491.094163][ T3637] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 491.102120][ T3637] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 491.110080][ T3637] [ 491.113083][ T3637] Modules linked in: [ 491.118675][ T3637] ---[ end trace 0000000000000000 ]--- [ 491.121931][T16427] loop5: detected capacity change from 0 to 24 [ 491.124520][ T3637] RIP: 0010:list_lru_add+0x277/0x510 [ 491.135630][ T3637] Code: 04 64 4d 8d 7c c7 10 4c 89 3c 24 e8 a3 a6 ca ff 49 8d 47 08 48 89 c2 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 02 00 00 4d 8b 77 08 48 89 df 48 8b 14 24 4c [ 491.141242][T16429] loop2: detected capacity change from 0 to 24 [ 491.155263][ T3637] RSP: 0018:ffffc9000332f9d0 EFLAGS: 00010202 [ 491.155287][ T3637] RAX: dffffc0000000000 RBX: ffff88823bdf6fc0 RCX: 0000000000000000 [ 491.155303][ T3637] RDX: 0000000000000001 RSI: ffffffff81ad8bad RDI: ffffffff8db5fd10 [ 491.155318][ T3637] RBP: ffff88807fbe47f0 R08: 0000000000000000 R09: ffffffff8db5fd17 [ 491.183241][T16426] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 491.183501][ T3637] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 491.183519][ T3637] R13: ffff88807f943080 R14: 0000000000000080 R15: 0000000000000000 [ 491.194546][T16429] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 491.199698][ T3637] FS: 00007f7aa4bdf840(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 491.217415][T16427] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 491.223960][ T3637] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 491.223980][ T3637] CR2: 00007fe036ea5fc8 CR3: 000000005b59a000 CR4: 00000000003506e0 [ 491.223995][ T3637] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 491.224009][ T3637] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 491.224026][ T3637] Kernel panic - not syncing: Fatal exception [ 491.224088][ T3637] Kernel Offset: disabled [ 491.282011][ T3637] Rebooting in 86400 seconds..