x0, 0x0) fchdir(r0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, &(0x7f00000004c0)) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) syz_mount_image$cifs(&(0x7f0000000040)='cifs\x00', &(0x7f0000000080)='./file0\x00', 0x7fffffff, 0x8, &(0x7f0000000840)=[{&(0x7f0000000180)="43ef9c8e012827734dbc38176374d63ed236408452672925d018dcc5937a7f601fdc4874c22499f054200dedf04f70377488e2574b01d8430e9bb8cdc8a2eedf2a5ab989394af86bad0a825f2b45acbd1e5950dfbb1585e8e87e7a47279e2c7735395a18b05e325edb511065301e32215936a1162ff256c22f2e759acf", 0x7d, 0x1}, {&(0x7f0000000200)="23e826aa60a85af3c428d1e57687d8f3d5c4558de9da0c95eb1e9e130103677b9a361a43ae3c064ade9be925886f24387bf82f0577ac212992298e4fd8e891c8f4fab617a4bdd79e56604c15fbbd083e9b051d497e1a819eb84ce56d3b7f03d686b449797a03778b417acf69ac1e2e2464a63dbda32a13cdb38732ef69ba8d96a1d8ef5f96ce2be294e7f192e8f76e", 0x8f, 0x7}, {&(0x7f00000000c0)="1717dc1057d4b3704441eeeae1f5ec4c9f316c07b1fdaad33592335ccba00e45b1da9e65c56a5beaa80e00bf28fc12727a0d450b9b5d8c9a7d553859", 0x3c, 0x200}, {&(0x7f0000000300)="12e2d130ee77709c75d91ad32d4dfc14cd72a22230118bd69b79110db4b56161e27d5aac34baf1915540bc539b8e54a022ae9e8188acadab286a9e494b772a4a704d99b438319e569c3fddc3900151a1d6be6d1cd5e207ab4e73b7a6186bbd1365eb032b9d7e746e992f5986dba4bdb1021f3de9f8a453d49a812de8f506689eb15749de76e55adb57547f0d1aa982b2493deade31531e521498950b60580f8170b47152380c86108399d59faa53facf4d16782303e80c44abfd1a1a0f24bc099698e75baf1b0bad14a4497e5953199dce65e882980c4b11ea1253139490fa823ab2c9bfb5963d888cd6cf786e091752bae66ae6b61a3886", 0xf8, 0x1}, {&(0x7f0000000580)="88de4d29287e7e60cc83eee278793d6981ca4823558256a1956d8db6e067a8cc5c33aabb16e555aa7b2abc86fefd042699d56b5fb1f73693349ff1f9891c3d7c34cb7c6728bbd3a4185833edfe749023e869c99d79704eb7873f1bba24ea2f2dc8d6101885cc341566869f841dd6379dde6c9b8c1a5a90d5369dc7a4f455f9947c7e3e72cc0ce1cafd3543dc21ad1dd74d1438303cb43b3ae7c5316115f8384796b44da56579686d6100519fe0e9fb42350adfd9a9ce303c8c882fbbff31d3e14aa835a74017fd9f23e868d4b8707071d20554a025f7", 0xd6, 0x2a2b}, {&(0x7f0000000680)="d94e69bf094d55c58cee8adf540f60642e58e1ee245cd4fa2cb7e99c2cf63c07bc757301878f09971cb33cdc77ec926871d5bb0e54cbdff3ddbf06fa548a953e353a8c64446c389682ba2de74d6f59c90706df4d4a41214a8a706d619d63c990f4c0146eb2b75e8f47116c07ce27d8dac166f9bc601408d6c2b849b690b78935cb3bfa8cf0e1eb", 0x87, 0x51}, {&(0x7f0000000740)="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", 0xfb, 0x1}, {&(0x7f0000002480)="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", 0x1000, 0x1ff}], 0x2000, &(0x7f0000000400)='\x00') write$UHID_INPUT(r3, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) r4 = creat(&(0x7f0000000500)='./bus\x00', 0x0) dup2(r4, 0xffffffffffffffff) splice(r4, &(0x7f0000000940)=0x8, r2, &(0x7f0000000980)=0x7, 0xd93, 0xa) fadvise64(r3, 0x4000, 0x0, 0x4) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000009c0)={0x1, 0xbd, "d7e71786db5651960090c834f381155eac12ef05ab18f1047f0224f16e30adc0212adbeb06db7758d51f375eaa8d2358346cfd1f1407ddf41f52f17a3c934323820ea8bf36530d8247203c5c5cf7bdf2eca31e3630dc398efaacdbe9d96663b5e800398b0efb6747826f80861766bdb70d0788e0115a1d5f904ba9d6da37b3e52e9b562be0ec70eccf85ca58e80c13dd899fa1da39ea6785d333cd8ddf075a257759a202454da088836a06e5fc926f1d323093793a25489bb8f254e238"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:32:43 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x700000000000000}], 0xc102, 0x0) 11:32:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 976.277067] attempt to access beyond end of device [ 976.282029] loop5: rw=2049, want=8229, limit=63 11:32:43 executing program 2: syz_emit_ethernet(0x109, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xcf, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6e"}]}}}}}}, 0x0) 11:32:43 executing program 2: syz_emit_ethernet(0x109, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xcf, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6e"}]}}}}}}, 0x0) 11:32:43 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x704000000000000}], 0xc102, 0x0) [ 976.674461] attempt to access beyond end of device [ 976.684137] loop3: rw=1, want=3193, limit=63 11:32:44 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2100000000000000}], 0xc102, 0x0) 11:32:44 executing program 2: syz_emit_ethernet(0xd7, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x9d, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:44 executing program 2: syz_emit_ethernet(0xd7, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x9d, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x3a) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:44 executing program 2: syz_emit_ethernet(0xd7, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x9d, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:44 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x804000000000000}], 0xc102, 0x0) 11:32:44 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2200000000000000}], 0xc102, 0x0) 11:32:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040)=0x7, 0x4) 11:32:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x5, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000000080)={0x9, r4, 0x1, 0x5}) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000008940)={&(0x7f0000008880)={0x10, 0x0, 0x0, 0x500000}, 0xc, &(0x7f0000008900)={&(0x7f00000088c0)={0x1c, 0x0, 0x20, 0xffffffff, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x48000) 11:32:45 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2300000000000000}], 0xc102, 0x0) 11:32:45 executing program 2: syz_emit_ethernet(0x10a, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xd0, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:45 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x900000000000000}], 0xc102, 0x0) [ 977.794740] attempt to access beyond end of device [ 977.811432] loop3: rw=1, want=557, limit=63 11:32:45 executing program 2: syz_emit_ethernet(0xd9, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x9f, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 977.854463] hid-generic 0000:0000:0000.011D: ignoring exceeding usage max 11:32:45 executing program 2: syz_emit_ethernet(0xd9, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x9f, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 977.910562] hid-generic 0000:0000:0000.011D: hidraw0: HID v0.00 Device [syz1] on %z5 11:32:45 executing program 2: syz_emit_ethernet(0xd9, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x9f, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 978.465316] hid-generic 0000:0000:0000.011E: ignoring exceeding usage max [ 978.508629] hid-generic 0000:0000:0000.011E: hidraw0: HID v0.00 Device [syz1] on %z5 [ 978.826537] attempt to access beyond end of device [ 978.842800] loop5: rw=2049, want=78, limit=63 [ 978.854920] buffer_io_error: 38 callbacks suppressed [ 978.854931] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 978.940674] attempt to access beyond end of device [ 978.951283] loop5: rw=2049, want=79, limit=63 [ 978.957949] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 978.988690] attempt to access beyond end of device [ 979.001833] loop5: rw=2049, want=80, limit=63 [ 979.013508] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 979.023885] attempt to access beyond end of device [ 979.032597] loop5: rw=2049, want=81, limit=63 [ 979.058509] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 979.067467] attempt to access beyond end of device [ 979.072412] loop5: rw=2049, want=130, limit=63 [ 979.078757] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 979.088005] attempt to access beyond end of device [ 979.092940] loop5: rw=2049, want=131, limit=63 [ 979.097601] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 979.106266] attempt to access beyond end of device [ 979.111198] loop5: rw=2049, want=132, limit=63 [ 979.115947] Buffer I/O error on dev loop5, logical block 131, lost async page write [ 979.123797] attempt to access beyond end of device [ 979.128958] loop5: rw=2049, want=133, limit=63 [ 979.133551] Buffer I/O error on dev loop5, logical block 132, lost async page write [ 979.141490] attempt to access beyond end of device [ 979.146539] loop5: rw=2049, want=142, limit=63 [ 979.151334] Buffer I/O error on dev loop5, logical block 141, lost async page write [ 979.159387] attempt to access beyond end of device [ 979.164328] loop5: rw=2049, want=143, limit=63 [ 979.168994] Buffer I/O error on dev loop5, logical block 142, lost async page write [ 979.176956] attempt to access beyond end of device [ 979.181886] loop5: rw=2049, want=144, limit=63 [ 979.186894] attempt to access beyond end of device [ 979.192377] loop5: rw=2049, want=145, limit=63 [ 979.200206] attempt to access beyond end of device 11:32:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x3b) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:46 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2400000000000000}], 0xc102, 0x0) 11:32:46 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x904000000000000}], 0xc102, 0x0) 11:32:46 executing program 2: syz_emit_ethernet(0xf2, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xb8, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x3, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x224041, 0x0) getsockopt$inet6_int(r1, 0x29, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r2, 0x4000, 0x0, 0x4) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) write$P9_RFSYNC(r4, &(0x7f0000000180)={0x7, 0x33, 0x2}, 0x7) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) rt_sigreturn() 11:32:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 979.205231] loop5: rw=2049, want=4241, limit=63 [ 979.212778] attempt to access beyond end of device [ 979.217812] loop5: rw=2049, want=6713, limit=63 11:32:46 executing program 2: syz_emit_ethernet(0xf2, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xb8, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x3, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:46 executing program 2: syz_emit_ethernet(0xf2, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xb8, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x3, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 979.457256] attempt to access beyond end of device 11:32:46 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2c00000000000000}], 0xc102, 0x0) 11:32:46 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xa04000000000000}], 0xc102, 0x0) [ 979.514448] hid-generic 0000:0000:0000.011F: ignoring exceeding usage max [ 979.521791] loop3: rw=1, want=949, limit=63 11:32:46 executing program 2: syz_emit_ethernet(0xfe, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc4, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x4, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 979.567247] hid-generic 0000:0000:0000.011F: hidraw0: HID v0.00 Device [syz1] on %z5 11:32:47 executing program 2: syz_emit_ethernet(0xfe, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc4, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x4, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x3c) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x1, 0x6}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:32:47 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x3600000000000000}], 0xc102, 0x0) 11:32:47 executing program 2: syz_emit_ethernet(0xfe, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc4, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x4, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:47 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xb04000000000000}], 0xc102, 0x0) 11:32:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048811}, 0x800) sendmsg$NL80211_CMD_SET_BEACON(r3, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000000c0)={0x18, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_PBSS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) dup2(r3, r2) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000180)={@caif=@dgm={0x25, 0x1ff, 0x6}, {&(0x7f0000002480)=""/4096, 0x1000}, &(0x7f0000000040), 0x32}, 0xa0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 980.417120] audit: type=1800 audit(1591443167.667:74): pid=17270 uid=0 auid=0 ses=5 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17510 res=0 11:32:47 executing program 2: syz_emit_ethernet(0x104, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xca, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x5, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f3"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 980.650203] attempt to access beyond end of device [ 980.660604] loop4: rw=1, want=249, limit=63 [ 980.676196] hid-generic 0000:0000:0000.0120: ignoring exceeding usage max 11:32:48 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x3f00000000000000}], 0xc102, 0x0) 11:32:48 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xc04000000000000}], 0xc102, 0x0) [ 980.740995] hid-generic 0000:0000:0000.0121: ignoring exceeding usage max [ 980.744501] attempt to access beyond end of device [ 980.753779] hid-generic 0000:0000:0000.0120: hidraw0: HID v0.00 Device [syz1] on %z5 11:32:48 executing program 2: syz_emit_ethernet(0x104, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xca, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x5, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f3"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 980.806470] hid-generic 0000:0000:0000.0121: hidraw1: HID v0.00 Device [syz1] on %z5 [ 980.812885] loop3: rw=1, want=841, limit=63 11:32:48 executing program 2: syz_emit_ethernet(0x104, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xca, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x5, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f3"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:48 executing program 2: syz_emit_ethernet(0x107, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xcd, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 981.304432] hid-generic 0000:0000:0000.0122: ignoring exceeding usage max [ 981.341160] hid-generic 0000:0000:0000.0123: ignoring exceeding usage max [ 981.349490] hid-generic 0000:0000:0000.0122: hidraw0: HID v0.00 Device [syz1] on %z5 [ 981.385068] hid-generic 0000:0000:0000.0123: hidraw1: HID v0.00 Device [syz1] on %z5 [ 981.405544] attempt to access beyond end of device [ 981.430256] loop3: rw=2049, want=78, limit=63 [ 981.442610] attempt to access beyond end of device [ 981.461521] loop3: rw=2049, want=79, limit=63 [ 981.481749] attempt to access beyond end of device [ 981.494664] loop3: rw=2049, want=80, limit=63 [ 981.508073] attempt to access beyond end of device [ 981.520143] loop3: rw=2049, want=81, limit=63 [ 981.910531] attempt to access beyond end of device [ 981.915588] loop5: rw=2049, want=78, limit=63 [ 981.920157] attempt to access beyond end of device [ 981.925598] loop5: rw=2049, want=79, limit=63 [ 981.930185] attempt to access beyond end of device [ 981.935641] loop5: rw=2049, want=80, limit=63 [ 981.940213] attempt to access beyond end of device [ 981.945830] loop5: rw=2049, want=81, limit=63 [ 981.950415] attempt to access beyond end of device [ 981.957078] loop5: rw=2049, want=114, limit=63 [ 981.961735] attempt to access beyond end of device [ 981.972963] loop5: rw=2049, want=115, limit=63 [ 981.982004] attempt to access beyond end of device [ 981.988171] loop5: rw=2049, want=116, limit=63 [ 981.992868] attempt to access beyond end of device [ 981.998868] loop5: rw=2049, want=117, limit=63 [ 982.003685] attempt to access beyond end of device [ 982.009724] loop5: rw=2049, want=130, limit=63 [ 982.014511] attempt to access beyond end of device [ 982.020460] loop5: rw=2049, want=131, limit=63 [ 982.026532] attempt to access beyond end of device [ 982.031626] loop5: rw=2049, want=132, limit=63 [ 982.037144] attempt to access beyond end of device [ 982.042339] loop5: rw=2049, want=133, limit=63 [ 982.051344] attempt to access beyond end of device 11:32:49 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x4000000000000000}], 0xc102, 0x0) 11:32:49 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xd00000000000000}], 0xc102, 0x0) 11:32:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x3d) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:49 executing program 2: syz_emit_ethernet(0x107, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xcd, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) socket$inet6(0xa, 0x3, 0x2f) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2}, 0x0, 0x4000000000000, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:32:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$kcm(0x10, 0x2, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x8, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x844) r1 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000180)='./file1\x00', 0x521042, 0x1b5) write$UHID_INPUT(r2, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="00fb5c005f6fd1e6adba32d9a7cb19ff2547c748da3d9afff573c46e23bc223d9b5b10cbbde88a546ec9db839b58c65c784deddc095bddba07f6410de225f9750a0da12397a862e28fca41b9e0e4ed1f082402"], 0x5c, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xc96c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r2, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x81, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x2, 0x9, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 982.056907] loop5: rw=2049, want=4237, limit=63 [ 982.066788] attempt to access beyond end of device [ 982.071772] loop5: rw=2049, want=8333, limit=63 [ 982.080858] attempt to access beyond end of device [ 982.086468] loop5: rw=2049, want=11765, limit=63 11:32:49 executing program 2: syz_emit_ethernet(0x107, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xcd, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 982.292192] attempt to access beyond end of device [ 982.299391] loop3: rw=1, want=281, limit=63 11:32:49 executing program 2: syz_emit_ethernet(0x109, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xcf, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f70211"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:49 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xd04000000000000}], 0xc102, 0x0) 11:32:49 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x40dc000000000000}], 0xc102, 0x0) 11:32:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x2, &(0x7f0000000040)='-\x00', r2}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2}, 0x0, 0xfffffffffffffffd, r3, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:32:49 executing program 2: syz_emit_ethernet(0x109, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xcf, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f70211"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) 11:32:49 executing program 2: syz_emit_ethernet(0x109, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xcf, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f70211"}, {0x0, 0x10, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad0405005c1cac92330401d0700e8b6eec"}]}}}}}}, 0x0) [ 982.721690] attempt to access beyond end of device [ 982.728679] loop4: rw=1, want=761, limit=63 [ 982.963442] attempt to access beyond end of device [ 982.978855] loop3: rw=2049, want=78, limit=63 [ 982.983490] attempt to access beyond end of device [ 982.992408] loop3: rw=2049, want=79, limit=63 [ 983.002260] attempt to access beyond end of device [ 983.008764] loop3: rw=2049, want=80, limit=63 [ 983.013419] attempt to access beyond end of device [ 983.026711] loop3: rw=2049, want=81, limit=63 [ 983.032218] attempt to access beyond end of device [ 983.042898] loop3: rw=2049, want=130, limit=63 [ 983.049440] attempt to access beyond end of device [ 983.054445] loop3: rw=2049, want=131, limit=63 [ 983.067467] attempt to access beyond end of device [ 983.072795] loop3: rw=2049, want=132, limit=63 [ 983.083020] attempt to access beyond end of device [ 983.089591] loop3: rw=2049, want=133, limit=63 [ 983.103535] attempt to access beyond end of device [ 983.115169] loop3: rw=2049, want=142, limit=63 [ 983.128551] attempt to access beyond end of device [ 983.141647] loop3: rw=2049, want=143, limit=63 [ 983.147983] attempt to access beyond end of device [ 983.166096] loop3: rw=2049, want=144, limit=63 [ 983.184148] attempt to access beyond end of device [ 983.196847] loop3: rw=2049, want=145, limit=63 [ 983.208008] attempt to access beyond end of device [ 983.230630] loop3: rw=2049, want=161, limit=63 [ 983.254613] attempt to access beyond end of device [ 983.266588] loop3: rw=2049, want=4377, limit=63 [ 983.296986] attempt to access beyond end of device [ 983.309289] loop3: rw=2049, want=8473, limit=63 [ 983.328544] attempt to access beyond end of device [ 983.339021] loop3: rw=2049, want=10025, limit=63 [ 983.394084] attempt to access beyond end of device [ 983.411577] loop4: rw=2049, want=78, limit=63 [ 983.439298] attempt to access beyond end of device [ 983.457204] loop4: rw=2049, want=79, limit=63 [ 983.473560] attempt to access beyond end of device [ 983.486052] loop4: rw=2049, want=80, limit=63 [ 983.496065] attempt to access beyond end of device [ 983.506864] loop4: rw=2049, want=81, limit=63 [ 983.516981] attempt to access beyond end of device [ 983.529051] loop4: rw=2049, want=130, limit=63 [ 983.539286] attempt to access beyond end of device [ 983.550102] loop4: rw=2049, want=131, limit=63 [ 983.574945] attempt to access beyond end of device [ 983.580089] loop4: rw=2049, want=132, limit=63 [ 983.584737] attempt to access beyond end of device [ 983.601404] loop4: rw=2049, want=133, limit=63 [ 983.607380] attempt to access beyond end of device [ 983.612647] loop4: rw=2049, want=142, limit=63 [ 983.619329] attempt to access beyond end of device [ 983.624381] loop5: rw=2049, want=78, limit=63 [ 983.628184] attempt to access beyond end of device [ 983.630775] attempt to access beyond end of device [ 983.634295] loop4: rw=2049, want=143, limit=63 [ 983.641718] loop5: rw=2049, want=79, limit=63 [ 983.649706] attempt to access beyond end of device [ 983.664897] attempt to access beyond end of device [ 983.666899] loop5: rw=2049, want=80, limit=63 [ 983.674403] attempt to access beyond end of device [ 983.675250] loop4: rw=2049, want=144, limit=63 [ 983.686931] loop5: rw=2049, want=81, limit=63 [ 983.691759] attempt to access beyond end of device [ 983.694063] attempt to access beyond end of device [ 983.698541] loop5: rw=2049, want=114, limit=63 [ 983.707703] attempt to access beyond end of device [ 983.712159] loop4: rw=2049, want=145, limit=63 [ 983.712642] loop5: rw=2049, want=115, limit=63 [ 983.717904] attempt to access beyond end of device [ 983.727445] loop4: rw=2049, want=161, limit=63 [ 983.736911] attempt to access beyond end of device [ 983.741794] attempt to access beyond end of device [ 983.741875] loop5: rw=2049, want=116, limit=63 [ 983.747027] loop4: rw=2049, want=4857, limit=63 [ 983.764032] attempt to access beyond end of device [ 983.764332] attempt to access beyond end of device [ 983.769770] loop4: rw=2049, want=8953, limit=63 [ 983.775862] loop5: rw=2049, want=117, limit=63 [ 983.782691] attempt to access beyond end of device [ 983.784666] attempt to access beyond end of device [ 983.788783] loop4: rw=2049, want=10257, limit=63 [ 983.805442] loop5: rw=2049, want=130, limit=63 [ 983.810103] attempt to access beyond end of device [ 983.817615] loop5: rw=2049, want=131, limit=63 [ 983.822409] attempt to access beyond end of device [ 983.827633] loop5: rw=2049, want=132, limit=63 [ 983.832528] attempt to access beyond end of device [ 983.838223] loop5: rw=2049, want=133, limit=63 [ 983.847726] attempt to access beyond end of device 11:32:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:51 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xe04000000000000}], 0xc102, 0x0) 11:32:51 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x6d00000000000000}], 0xc102, 0x0) 11:32:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 11:32:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_thread_area(&(0x7f0000000080)={0x3, 0x20000800, 0x6000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.opaque\x00', &(0x7f00000001c0)='self*trustedposix_acl_access', 0x1c, 0x3) 11:32:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x101, 0x0, 0x0, 0x0, 0x788}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 983.852679] loop5: rw=2049, want=4237, limit=63 [ 983.864335] attempt to access beyond end of device [ 983.869537] loop5: rw=2049, want=8333, limit=63 [ 983.881416] attempt to access beyond end of device [ 983.886456] loop5: rw=2049, want=12429, limit=63 [ 983.893787] attempt to access beyond end of device [ 983.898882] loop5: rw=2049, want=12669, limit=63 11:32:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x4, 0x2d0, 0x1ac, 0x17c, 0xe8, 0x17c, 0x1ac, 0x300, 0x23c, 0x23c, 0x23c, 0x300, 0x4, 0x0, {[{{@ip={@rand_addr, @loopback, 0x0, 0x0, 'macsec0\x00', 'batadv0\x00'}, 0x0, 0xa8, 0xe8, 0x0, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "ddfb9069b3f8aeff7c183cb616d6ad49f545460f9e8f7adf27e10a681d5e"}}}, {{@uncond, 0x0, 0x70, 0x94}, @common=@inet=@SYNPROXY={0x24, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x9c, 0xc0, 0x0, {}, [@common=@ah={{0x2c, 'ah\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x32c) tkill(r0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 984.110893] attempt to access beyond end of device [ 984.130680] loop3: rw=1, want=737, limit=63 11:32:51 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf00000000000000}], 0xc102, 0x0) 11:32:51 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x3ac) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 11:32:51 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x6e00000000000000}], 0xc102, 0x0) [ 984.272632] attempt to access beyond end of device [ 984.308341] loop4: rw=1, want=305, limit=63 11:32:51 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf04000000000000}], 0xc102, 0x0) 11:32:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000f7ffffffffffffff00000000000000000000000000000e00000004000000cc02000074020000b0000000b000000000000000b0000000080300003802000038020000380200000803ef000400000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b000000000000000000000000000000000000000000040004c4f470000000000000000000000000000000000000000000000000000000000a6fe86583a0c9da81c652b77a96d3e38ada3dbf9bc2d9b05778350aea1000000000000000000000000000000000000000000000000000000000000f1ffffff000000df0000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000009400f400000000000000ecffffff00000000000000000000240065636e0000000000000000008b0000000000000000000000000000000000010000006000534554000000000800000000000010000000000000000000000000000000000000004cb090f6315808a28a311200000000000000000000000000000000000000000000000020000000008000000000000000000000000000000010000000e0000001e00000010000660ec80fdbd3ab0c36746e6c300000000000000000007767310000000000000600000000000000000000002000000000000000000000000000000000ffff00000000000000000000000000000000700094000000000000000000000000000000000000000000240052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @local, @remote}}}], 0x18}, 0x0) [ 984.797125] attempt to access beyond end of device [ 984.814565] loop3: rw=2049, want=78, limit=63 [ 984.831532] buffer_io_error: 54 callbacks suppressed [ 984.831543] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 984.870516] attempt to access beyond end of device [ 984.884135] loop3: rw=2049, want=79, limit=63 [ 984.902022] Buffer I/O error on dev loop3, logical block 78, lost async page write [ 984.924958] attempt to access beyond end of device [ 984.931145] attempt to access beyond end of device [ 984.936737] loop4: rw=2049, want=78, limit=63 [ 984.945924] Buffer I/O error on dev loop4, logical block 77, lost async page write [ 984.948242] loop3: rw=2049, want=80, limit=63 [ 984.962814] attempt to access beyond end of device [ 984.973075] Buffer I/O error on dev loop3, logical block 79, lost async page write [ 984.973662] loop4: rw=2049, want=79, limit=63 [ 984.999158] Buffer I/O error on dev loop4, logical block 78, lost async page write [ 985.002373] attempt to access beyond end of device [ 985.015127] attempt to access beyond end of device [ 985.023191] loop3: rw=2049, want=81, limit=63 [ 985.025771] loop4: rw=2049, want=80, limit=63 [ 985.035802] Buffer I/O error on dev loop4, logical block 79, lost async page write [ 985.038784] Buffer I/O error on dev loop3, logical block 80, lost async page write [ 985.052757] attempt to access beyond end of device [ 985.063644] loop4: rw=2049, want=81, limit=63 [ 985.073278] Buffer I/O error on dev loop4, logical block 80, lost async page write [ 985.073916] attempt to access beyond end of device [ 985.090698] attempt to access beyond end of device [ 985.101589] loop4: rw=2049, want=130, limit=63 [ 985.108238] loop3: rw=2049, want=130, limit=63 [ 985.112073] Buffer I/O error on dev loop4, logical block 129, lost async page write [ 985.123690] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 985.131060] attempt to access beyond end of device [ 985.153784] loop4: rw=2049, want=131, limit=63 [ 985.161541] attempt to access beyond end of device [ 985.163197] attempt to access beyond end of device [ 985.176087] loop4: rw=2049, want=132, limit=63 [ 985.179630] loop3: rw=2049, want=131, limit=63 [ 985.193715] attempt to access beyond end of device [ 985.221682] loop4: rw=2049, want=133, limit=63 [ 985.228468] attempt to access beyond end of device [ 985.232103] attempt to access beyond end of device [ 985.249313] loop4: rw=2049, want=142, limit=63 [ 985.259960] attempt to access beyond end of device [ 985.272728] loop4: rw=2049, want=143, limit=63 [ 985.273721] loop3: rw=2049, want=132, limit=63 [ 985.277529] attempt to access beyond end of device [ 985.288161] loop4: rw=2049, want=144, limit=63 [ 985.293445] attempt to access beyond end of device [ 985.298574] loop4: rw=2049, want=145, limit=63 [ 985.300144] attempt to access beyond end of device [ 985.303324] attempt to access beyond end of device [ 985.313514] loop4: rw=2049, want=161, limit=63 [ 985.323481] attempt to access beyond end of device [ 985.329905] loop4: rw=2049, want=4401, limit=63 [ 985.344329] attempt to access beyond end of device [ 985.349483] loop4: rw=2049, want=8217, limit=63 [ 985.350652] loop3: rw=2049, want=133, limit=63 [ 985.389431] attempt to access beyond end of device [ 985.404952] loop3: rw=2049, want=142, limit=63 [ 985.415801] attempt to access beyond end of device [ 985.442690] loop3: rw=2049, want=143, limit=63 [ 985.448822] attempt to access beyond end of device [ 985.460594] loop5: rw=2049, want=78, limit=63 [ 985.466061] attempt to access beyond end of device [ 985.471246] loop3: rw=2049, want=144, limit=63 [ 985.475409] attempt to access beyond end of device [ 985.481363] loop5: rw=2049, want=79, limit=63 [ 985.486480] attempt to access beyond end of device [ 985.492138] loop5: rw=2049, want=80, limit=63 [ 985.496991] attempt to access beyond end of device [ 985.502316] loop5: rw=2049, want=81, limit=63 [ 985.507730] attempt to access beyond end of device [ 985.509634] attempt to access beyond end of device [ 985.512672] loop3: rw=2049, want=145, limit=63 [ 985.512757] attempt to access beyond end of device [ 985.520612] loop5: rw=2049, want=130, limit=63 [ 985.537928] attempt to access beyond end of device [ 985.540363] loop3: rw=2049, want=161, limit=63 [ 985.560161] loop5: rw=2049, want=131, limit=63 [ 985.565811] attempt to access beyond end of device [ 985.570868] loop5: rw=2049, want=132, limit=63 [ 985.580714] attempt to access beyond end of device [ 985.580961] attempt to access beyond end of device [ 985.587321] loop5: rw=2049, want=133, limit=63 [ 985.601926] loop3: rw=2049, want=4833, limit=63 [ 985.602158] attempt to access beyond end of device [ 985.612942] loop5: rw=2049, want=142, limit=63 [ 985.619654] attempt to access beyond end of device [ 985.623009] attempt to access beyond end of device [ 985.624612] loop3: rw=2049, want=8929, limit=63 [ 985.628085] attempt to access beyond end of device [ 985.632035] loop5: rw=2049, want=143, limit=63 [ 985.634285] loop3: rw=2049, want=9921, limit=63 [ 985.648838] attempt to access beyond end of device [ 985.655789] loop5: rw=2049, want=144, limit=63 [ 985.660442] attempt to access beyond end of device [ 985.667632] loop5: rw=2049, want=145, limit=63 [ 985.684379] attempt to access beyond end of device [ 985.689489] loop5: rw=2049, want=4241, limit=63 [ 985.701218] attempt to access beyond end of device [ 985.706318] loop5: rw=2049, want=8105, limit=63 11:32:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x41) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:53 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x7e00000000000000}], 0xc102, 0x0) 11:32:53 executing program 2: syz_emit_ethernet(0xfa, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc0, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0xe, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad"}]}}}}}}, 0x0) 11:32:53 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x1000000000000000}], 0xc102, 0x0) 11:32:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x20000, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) write$tun(r3, &(0x7f0000000580)={@val={0x0, 0x22f0}, @void, @ipv4=@generic={{0x1f, 0x4, 0x3, 0x9, 0x17a, 0x67, 0x0, 0x7f, 0x84, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0xd, 0x0, [{0x0, 0x7, "81b1e0ea9e"}]}, @timestamp_addr={0x44, 0x1c, 0xf6, 0x1, 0x6, [{@rand_addr=0x64010102, 0x7}, {@private=0xa010102, 0x800}, {@rand_addr=0x64010101, 0x7}]}, @generic={0x82, 0x3, '|'}, @cipso={0x86, 0x39, 0x3, [{0x0, 0x7, "d6089ec755"}, {0x7, 0x7, "d78097426d"}, {0x2, 0xa, "f4a042ffaabe65ac"}, {0x1, 0x10, "eabffec3383a05409a733916aa90"}, {0x1, 0xb, "b5b4184818be017335"}]}]}}, "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"}}, 0x17e) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:32:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:32:53 executing program 2: syz_emit_ethernet(0xfa, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc0, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0xe, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad"}]}}}}}}, 0x0) 11:32:53 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2000000000000000}], 0xc102, 0x0) 11:32:53 executing program 2: syz_emit_ethernet(0xfa, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc0, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0xe, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad"}]}}}}}}, 0x0) 11:32:53 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x7f00000000000000}], 0xc102, 0x0) [ 985.969956] hid-generic 0000:0000:0000.0124: ignoring exceeding usage max [ 985.993230] hid-generic 0000:0000:0000.0124: hidraw0: HID v0.00 Device [syz1] on %z5 11:32:53 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 11:32:53 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) [ 986.247442] attempt to access beyond end of device [ 986.295645] loop3: rw=1, want=1073, limit=63 [ 986.637521] hid-generic 0000:0000:0000.0125: ignoring exceeding usage max [ 986.681414] hid-generic 0000:0000:0000.0125: hidraw0: HID v0.00 Device [syz1] on %z5 [ 986.901898] attempt to access beyond end of device [ 986.913667] loop3: rw=2049, want=78, limit=63 [ 986.922816] attempt to access beyond end of device [ 986.937043] loop3: rw=2049, want=79, limit=63 [ 986.964193] attempt to access beyond end of device [ 987.002979] loop3: rw=2049, want=80, limit=63 [ 987.035091] attempt to access beyond end of device [ 987.058114] loop3: rw=2049, want=81, limit=63 [ 987.072500] attempt to access beyond end of device [ 987.104453] loop3: rw=2049, want=130, limit=63 [ 987.119800] attempt to access beyond end of device [ 987.134200] loop3: rw=2049, want=131, limit=63 [ 987.153429] attempt to access beyond end of device [ 987.159443] loop3: rw=2049, want=132, limit=63 [ 987.164253] attempt to access beyond end of device [ 987.172317] loop3: rw=2049, want=133, limit=63 [ 987.180280] attempt to access beyond end of device [ 987.188071] loop3: rw=2049, want=142, limit=63 [ 987.192905] attempt to access beyond end of device [ 987.201421] loop3: rw=2049, want=143, limit=63 [ 987.209076] attempt to access beyond end of device [ 987.220291] loop3: rw=2049, want=144, limit=63 [ 987.225821] attempt to access beyond end of device [ 987.230869] loop3: rw=2049, want=145, limit=63 [ 987.237371] attempt to access beyond end of device [ 987.242443] loop3: rw=2049, want=161, limit=63 11:32:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x42) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:54 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2200000000000000}], 0xc102, 0x0) 11:32:54 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x8000000000000000}], 0xc102, 0x0) 11:32:54 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 11:32:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$VFIO_SET_IOMMU(r1, 0x3b66, 0x8) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:32:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x401, 0xa0c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_tcp(0x2, 0x1, 0x0) 11:32:54 executing program 2: syz_emit_ethernet(0xfa, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc0, 0x3a, 0x0, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0xe, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad"}]}}}}}}, 0x0) [ 987.253179] attempt to access beyond end of device [ 987.258946] loop3: rw=2049, want=5169, limit=63 [ 987.284738] attempt to access beyond end of device [ 987.292789] loop3: rw=2049, want=7697, limit=63 [ 987.451589] attempt to access beyond end of device 11:32:54 executing program 2: syz_emit_ethernet(0xfa, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc0, 0x3a, 0x0, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0xe, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad"}]}}}}}}, 0x0) [ 987.472952] loop4: rw=1, want=525, limit=63 11:32:54 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2300000000000000}], 0xc102, 0x0) 11:32:54 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x8cffffff00000000}], 0xc102, 0x0) 11:32:54 executing program 2: syz_emit_ethernet(0xfa, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0xc0, 0x3a, 0x0, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}, {0x0, 0xe, "05fc0b15bef37a1c5821f10d03311fdd549eae23f8827d9111255977cbd6d13bf2bfe2b5a8b5c0bdfe0b68b61884598ce2b0f9551816a9de03bd367365ad0fb79a7907581e2e14759c5aaac444f9a1cd7922b870b99fd05e3dfd7afebe4ced32505260a05988ad6032e731d191cbaba4fb06ad"}]}}}}}}, 0x0) 11:32:54 executing program 2: syz_emit_ethernet(0x85, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x4b, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x2, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}]}}}}}}, 0x0) [ 987.758974] attempt to access beyond end of device [ 987.776011] loop3: rw=1, want=1069, limit=63 [ 988.115298] attempt to access beyond end of device [ 988.143945] loop4: rw=2049, want=78, limit=63 [ 988.161370] attempt to access beyond end of device [ 988.172246] loop4: rw=2049, want=79, limit=63 [ 988.190734] attempt to access beyond end of device [ 988.210298] loop4: rw=2049, want=80, limit=63 [ 988.225027] attempt to access beyond end of device [ 988.241261] loop4: rw=2049, want=81, limit=63 [ 988.256027] attempt to access beyond end of device [ 988.272644] loop4: rw=2049, want=114, limit=63 [ 988.287539] attempt to access beyond end of device [ 988.306910] loop4: rw=2049, want=115, limit=63 [ 988.321664] attempt to access beyond end of device [ 988.337891] loop4: rw=2049, want=116, limit=63 [ 988.364012] attempt to access beyond end of device [ 988.380352] loop4: rw=2049, want=117, limit=63 [ 988.395152] attempt to access beyond end of device [ 988.415448] loop4: rw=2049, want=130, limit=63 [ 988.430811] attempt to access beyond end of device [ 988.435949] attempt to access beyond end of device [ 988.446472] loop4: rw=2049, want=131, limit=63 [ 988.451173] loop3: rw=2049, want=78, limit=63 [ 988.461462] attempt to access beyond end of device [ 988.466847] attempt to access beyond end of device [ 988.477385] loop4: rw=2049, want=132, limit=63 [ 988.482061] loop3: rw=2049, want=79, limit=63 [ 988.491163] attempt to access beyond end of device [ 988.496916] attempt to access beyond end of device [ 988.502868] attempt to access beyond end of device [ 988.507990] loop4: rw=2049, want=133, limit=63 [ 988.512681] loop3: rw=2049, want=80, limit=63 [ 988.517654] loop5: rw=2049, want=78, limit=63 [ 988.522341] attempt to access beyond end of device [ 988.527781] attempt to access beyond end of device [ 988.532862] attempt to access beyond end of device [ 988.538305] loop3: rw=2049, want=81, limit=63 [ 988.542882] loop4: rw=2049, want=157, limit=63 [ 988.547877] loop5: rw=2049, want=79, limit=63 [ 988.552532] attempt to access beyond end of device [ 988.558770] attempt to access beyond end of device [ 988.563891] loop3: rw=2049, want=114, limit=63 [ 988.568249] attempt to access beyond end of device [ 988.572540] attempt to access beyond end of device [ 988.573742] loop5: rw=2049, want=80, limit=63 [ 988.581845] loop3: rw=2049, want=115, limit=63 [ 988.583343] loop4: rw=2049, want=4621, limit=63 [ 988.588564] attempt to access beyond end of device [ 988.592788] attempt to access beyond end of device [ 988.603729] loop3: rw=2049, want=116, limit=63 [ 988.604734] loop5: rw=2049, want=81, limit=63 [ 988.610156] attempt to access beyond end of device [ 988.615454] attempt to access beyond end of device [ 988.623261] attempt to access beyond end of device [ 988.623742] loop3: rw=2049, want=117, limit=63 [ 988.628530] loop4: rw=2049, want=5941, limit=63 [ 988.634210] attempt to access beyond end of device [ 988.637861] loop5: rw=2049, want=114, limit=63 [ 988.648204] loop3: rw=2049, want=130, limit=63 [ 988.648548] attempt to access beyond end of device [ 988.653102] attempt to access beyond end of device [ 988.671087] loop3: rw=2049, want=131, limit=63 [ 988.671298] loop5: rw=2049, want=115, limit=63 [ 988.677109] attempt to access beyond end of device [ 988.683856] attempt to access beyond end of device [ 988.690806] loop5: rw=2049, want=116, limit=63 [ 988.695910] attempt to access beyond end of device [ 988.699725] loop3: rw=2049, want=132, limit=63 [ 988.700845] loop5: rw=2049, want=117, limit=63 [ 988.700893] attempt to access beyond end of device [ 988.708875] attempt to access beyond end of device [ 988.712747] loop5: rw=2049, want=130, limit=63 [ 988.722617] loop3: rw=2049, want=133, limit=63 [ 988.727632] attempt to access beyond end of device [ 988.732664] attempt to access beyond end of device [ 988.737400] loop5: rw=2049, want=131, limit=63 [ 988.748721] loop3: rw=2049, want=157, limit=63 [ 988.762633] attempt to access beyond end of device [ 988.764548] attempt to access beyond end of device [ 988.770238] loop3: rw=2049, want=5165, limit=63 [ 988.772628] loop5: rw=2049, want=132, limit=63 [ 988.772676] attempt to access beyond end of device [ 988.790278] attempt to access beyond end of device [ 988.800761] loop3: rw=2049, want=9261, limit=63 [ 988.804548] loop5: rw=2049, want=133, limit=63 [ 988.810705] attempt to access beyond end of device 11:32:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x43) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:56 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x2c00000000000000}], 0xc102, 0x0) 11:32:56 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x18, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2}}}}}}, 0x0) 11:32:56 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xb626000000000000}], 0xc102, 0x0) 11:32:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:32:56 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000000)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r2, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 988.821653] loop3: rw=2049, want=10485, limit=63 [ 988.825485] attempt to access beyond end of device [ 988.831824] loop5: rw=2049, want=4237, limit=63 [ 988.845785] attempt to access beyond end of device [ 988.850790] loop5: rw=2049, want=8333, limit=63 [ 988.860250] attempt to access beyond end of device [ 988.865359] loop5: rw=2049, want=10637, limit=63 11:32:56 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x18, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2}}}}}}, 0x0) 11:32:56 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x3f00000000000000}], 0xc102, 0x0) 11:32:56 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x18, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2}}}}}}, 0x0) 11:32:56 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xc826000000000000}], 0xc102, 0x0) [ 989.162676] attempt to access beyond end of device [ 989.173472] loop4: rw=1, want=613, limit=63 11:32:56 executing program 2: syz_emit_ethernet(0x85, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x4b, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{0x0, 0x6, "da0992ac2e2d62d00aa831e956dc2e8a19c309f24faeb89282eaff7d9df938198a135cc702e6f7c29162f33548f7021143"}]}}}}}}, 0x0) 11:32:56 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x4000000000000000}], 0xc102, 0x0) [ 989.812362] attempt to access beyond end of device [ 989.835816] loop4: rw=2049, want=78, limit=63 [ 989.847103] buffer_io_error: 74 callbacks suppressed [ 989.847114] Buffer I/O error on dev loop4, logical block 77, lost async page write [ 989.875807] attempt to access beyond end of device [ 989.886567] loop4: rw=2049, want=79, limit=63 [ 989.898737] Buffer I/O error on dev loop4, logical block 78, lost async page write [ 989.923294] attempt to access beyond end of device [ 989.939642] loop4: rw=2049, want=80, limit=63 [ 989.955247] Buffer I/O error on dev loop4, logical block 79, lost async page write [ 989.980949] attempt to access beyond end of device [ 989.998842] loop4: rw=2049, want=81, limit=63 [ 990.013924] Buffer I/O error on dev loop4, logical block 80, lost async page write [ 990.074541] attempt to access beyond end of device [ 990.079516] loop4: rw=2049, want=114, limit=63 [ 990.087898] Buffer I/O error on dev loop4, logical block 113, lost async page write [ 990.110648] attempt to access beyond end of device [ 990.134447] loop4: rw=2049, want=115, limit=63 [ 990.139077] Buffer I/O error on dev loop4, logical block 114, lost async page write [ 990.166369] attempt to access beyond end of device [ 990.195090] loop4: rw=2049, want=116, limit=63 [ 990.199728] Buffer I/O error on dev loop4, logical block 115, lost async page write [ 990.224488] attempt to access beyond end of device [ 990.229507] loop4: rw=2049, want=117, limit=63 [ 990.234108] Buffer I/O error on dev loop4, logical block 116, lost async page write [ 990.253579] attempt to access beyond end of device [ 990.259938] attempt to access beyond end of device [ 990.263340] loop4: rw=2049, want=130, limit=63 [ 990.266356] loop5: rw=2049, want=78, limit=63 [ 990.275304] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 990.276619] Buffer I/O error on dev loop4, logical block 129, lost async page write [ 990.283120] attempt to access beyond end of device [ 990.304124] loop5: rw=2049, want=79, limit=63 [ 990.310737] attempt to access beyond end of device [ 990.322423] loop5: rw=2049, want=80, limit=63 [ 990.329993] attempt to access beyond end of device [ 990.337766] attempt to access beyond end of device [ 990.342802] loop5: rw=2049, want=81, limit=63 [ 990.349602] loop4: rw=2049, want=131, limit=63 [ 990.355221] attempt to access beyond end of device [ 990.360304] attempt to access beyond end of device [ 990.366754] loop5: rw=2049, want=114, limit=63 [ 990.371413] loop4: rw=2049, want=132, limit=63 [ 990.377624] attempt to access beyond end of device [ 990.382874] attempt to access beyond end of device [ 990.389443] loop5: rw=2049, want=115, limit=63 [ 990.394114] loop4: rw=2049, want=133, limit=63 [ 990.400392] attempt to access beyond end of device [ 990.410983] attempt to access beyond end of device [ 990.417066] loop5: rw=2049, want=116, limit=63 [ 990.421857] loop4: rw=2049, want=157, limit=63 [ 990.439269] attempt to access beyond end of device [ 990.450471] loop5: rw=2049, want=117, limit=63 [ 990.457290] attempt to access beyond end of device [ 990.466487] attempt to access beyond end of device [ 990.471552] loop4: rw=2049, want=4709, limit=63 [ 990.478081] loop5: rw=2049, want=130, limit=63 [ 990.482791] attempt to access beyond end of device [ 990.488086] attempt to access beyond end of device [ 990.492657] loop5: rw=2049, want=131, limit=63 [ 990.493084] loop4: rw=2049, want=8805, limit=63 [ 990.500405] attempt to access beyond end of device [ 990.507016] attempt to access beyond end of device [ 990.512519] loop5: rw=2049, want=132, limit=63 [ 990.512687] loop4: rw=2049, want=10501, limit=63 [ 990.520275] attempt to access beyond end of device [ 990.531562] loop5: rw=2049, want=133, limit=63 [ 990.542525] attempt to access beyond end of device [ 990.549053] loop5: rw=2049, want=4237, limit=63 11:32:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x44) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:57 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf0ffffff00000000}], 0xc102, 0x0) 11:32:57 executing program 2: syz_emit_ethernet(0x54, &(0x7f0000000080)={@random="9f2193f9bff4", @remote, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4d888c", 0x1a, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private2, [{}]}}}}}}, 0x0) 11:32:57 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x40dc000000000000}], 0xc102, 0x0) 11:32:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) sendmsg$SOCK_DIAG_BY_FAMILY(r3, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000580)={0x1f0, 0x14, 0x800, 0x70bd2c, 0x25dfdbff, {0x2b, 0x30}, [@INET_DIAG_REQ_BYTECODE={0x6, 0x1, "031a"}, @INET_DIAG_REQ_BYTECODE={0xb9, 0x1, "2733b8782cb0be9e36941db327fa77d711543f9a5732659b4ad98074fcf5b40677ab2f0c8fcf22a6960d47dad7021ed347e25fd25e289ef249b886170c4bf38488121ab888adf0ad1f5a8e2fdf3b29b1d0e36771da24a72062c306cf9173fc065beeb4203d1a77f7dc33ea403761f2e5f620b6e488392359908aeaae168372cc21ad0ef6b9ff2f51cbc5ebe9ecc2389a4b374fa60ca4a5c3b527a95837f961257e14115a7d0458d93b2ba1d382390a011ef1558357"}, @INET_DIAG_REQ_BYTECODE={0xc7, 0x1, "8ea775e35ad18bf23419e3f8a86960268041e8d84c7a7848ed7b6deaeba2f7a54288f7a4d9cc594ccc491f96afb0300900d4df9f8bb562202f2a7230ec64a7c1100d00847ea6bef5304bb66019da21cae3eb7e6f6ca5beefef870d2a413a3112844fab02f62bb2d082679d11fbc19facea86c5b2553724e33f38662813785af90e8e3215b1e71c3c2001046f3aff9874694da3b1079e5aaf7fecffc421adddc84f4949adb546eb2c0135b387f4ca94831ece202a4edc7511f0f3517629b3bd6bd1fb7a"}, @INET_DIAG_REQ_BYTECODE={0x33, 0x1, "691723bcf4aa91df35a5ed62bad1c3817fb87379cf110aa34aaf30d807cf5fd0ff8f815ac9d9579e71a55a375690ac"}, @INET_DIAG_REQ_BYTECODE={0x1b, 0x1, "90d6f6f867245d0e359126eb11eb07fc6b6e2ba15db1d1"}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x80}, 0x44) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:32:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000040)={{0x4, @addr=0x1}, 0x8, 0x8, 0x82}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 990.559305] attempt to access beyond end of device [ 990.564472] loop5: rw=2049, want=8333, limit=63 [ 990.571397] attempt to access beyond end of device [ 990.576442] loop5: rw=2049, want=9773, limit=63 11:32:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xde) 11:32:58 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf5ffffff00000000}], 0xc102, 0x0) [ 990.806748] hid-generic 0000:0000:0000.0126: ignoring exceeding usage max 11:32:58 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x4800000000000000}], 0xc102, 0x0) [ 990.851453] hid-generic 0000:0000:0000.0126: hidraw0: HID v0.00 Device [syz1] on %z5 [ 990.907002] attempt to access beyond end of device [ 990.939765] loop3: rw=1, want=1793, limit=63 [ 991.001939] attempt to access beyond end of device [ 991.034280] loop2: rw=1, want=1197, limit=63 11:32:58 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf6ffffff00000000}], 0xc102, 0x0) 11:32:58 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x4c00000000000000}], 0xc102, 0x0) [ 991.449443] attempt to access beyond end of device [ 991.460991] loop4: rw=1, want=549, limit=63 11:32:58 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf703000000000000}], 0xc102, 0x0) [ 991.656948] attempt to access beyond end of device [ 991.677929] loop2: rw=2049, want=78, limit=63 [ 991.700446] attempt to access beyond end of device [ 991.726056] loop2: rw=2049, want=79, limit=63 [ 991.741926] attempt to access beyond end of device [ 991.774565] loop2: rw=2049, want=80, limit=63 [ 991.790680] attempt to access beyond end of device [ 991.808607] loop2: rw=2049, want=81, limit=63 [ 991.823971] attempt to access beyond end of device [ 991.841489] loop2: rw=2049, want=114, limit=63 [ 991.853053] attempt to access beyond end of device [ 991.869756] loop2: rw=2049, want=115, limit=63 [ 991.886288] attempt to access beyond end of device [ 991.911061] loop2: rw=2049, want=116, limit=63 [ 991.924974] attempt to access beyond end of device [ 991.943300] loop2: rw=2049, want=117, limit=63 [ 991.960586] attempt to access beyond end of device [ 991.972450] loop2: rw=2049, want=130, limit=63 [ 992.001561] attempt to access beyond end of device [ 992.037547] loop2: rw=2049, want=131, limit=63 [ 992.050575] attempt to access beyond end of device [ 992.059823] attempt to access beyond end of device [ 992.082331] loop5: rw=2049, want=78, limit=63 [ 992.084684] loop2: rw=2049, want=132, limit=63 [ 992.096660] attempt to access beyond end of device [ 992.100748] attempt to access beyond end of device [ 992.107499] attempt to access beyond end of device [ 992.126100] loop4: rw=2049, want=78, limit=63 [ 992.141842] loop2: rw=2049, want=133, limit=63 [ 992.147329] loop5: rw=2049, want=79, limit=63 [ 992.147674] attempt to access beyond end of device [ 992.162140] attempt to access beyond end of device [ 992.164165] attempt to access beyond end of device [ 992.176872] loop2: rw=2049, want=157, limit=63 [ 992.181700] loop4: rw=2049, want=79, limit=63 [ 992.182048] loop5: rw=2049, want=80, limit=63 [ 992.192114] attempt to access beyond end of device [ 992.202415] attempt to access beyond end of device [ 992.203492] loop4: rw=2049, want=80, limit=63 [ 992.217633] attempt to access beyond end of device [ 992.218469] attempt to access beyond end of device [ 992.223033] loop5: rw=2049, want=81, limit=63 [ 992.239495] loop2: rw=2049, want=5293, limit=63 [ 992.240944] loop4: rw=2049, want=81, limit=63 [ 992.245561] attempt to access beyond end of device [ 992.254156] attempt to access beyond end of device [ 992.258546] attempt to access beyond end of device [ 992.266826] loop4: rw=2049, want=114, limit=63 [ 992.271652] loop5: rw=2049, want=114, limit=63 [ 992.277105] attempt to access beyond end of device [ 992.278025] attempt to access beyond end of device [ 992.289490] loop4: rw=2049, want=115, limit=63 [ 992.292755] loop2: rw=2049, want=6013, limit=63 [ 992.301151] attempt to access beyond end of device [ 992.301816] loop5: rw=2049, want=115, limit=63 [ 992.322268] loop4: rw=2049, want=116, limit=63 [ 992.329081] attempt to access beyond end of device [ 992.334153] loop4: rw=2049, want=117, limit=63 [ 992.334400] attempt to access beyond end of device [ 992.339216] attempt to access beyond end of device [ 992.348901] loop4: rw=2049, want=130, limit=63 [ 992.353631] attempt to access beyond end of device [ 992.353878] loop5: rw=2049, want=116, limit=63 [ 992.360017] loop4: rw=2049, want=131, limit=63 [ 992.368984] attempt to access beyond end of device [ 992.374040] loop4: rw=2049, want=132, limit=63 [ 992.379151] attempt to access beyond end of device [ 992.384192] loop4: rw=2049, want=133, limit=63 [ 992.385394] attempt to access beyond end of device [ 992.390325] attempt to access beyond end of device [ 992.394532] loop5: rw=2049, want=117, limit=63 [ 992.406498] attempt to access beyond end of device [ 992.407075] loop4: rw=2049, want=157, limit=63 [ 992.411484] loop5: rw=2049, want=130, limit=63 [ 992.421342] attempt to access beyond end of device [ 992.423398] attempt to access beyond end of device [ 992.427355] loop5: rw=2049, want=131, limit=63 [ 992.437265] attempt to access beyond end of device [ 992.439590] loop4: rw=2049, want=4645, limit=63 [ 992.453064] attempt to access beyond end of device [ 992.454712] loop5: rw=2049, want=132, limit=63 [ 992.459583] loop4: rw=2049, want=7173, limit=63 [ 992.467625] attempt to access beyond end of device [ 992.472619] loop5: rw=2049, want=133, limit=63 [ 992.488372] attempt to access beyond end of device [ 992.493395] loop5: rw=2049, want=4237, limit=63 11:32:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x45) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:32:59 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x6000000000000000}], 0xc102, 0x0) 11:32:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x9f, 0x2, 0xe8, 0xbd, 0x4, 0x2, 0x3e, 0x7fffffff, 0xe, 0x40, 0x2e1, 0x631, 0x0, 0x38, 0x2, 0xf398, 0x5, 0x1}, [{0x6474e551, 0x3, 0xffffffffffffdbef, 0x5, 0x8, 0x7, 0x3, 0xc618}, {0x60000000, 0x7f, 0xffff, 0x100000000, 0x973, 0x3ff, 0x4, 0x80000000}], "615fe6232f305df594a2d5927bf4691cc4479774e945bd3f5d6e0b4a8e4ccdfbd0f938cf95258bc8533450546ea68f5d44252d1a2063f7c42fd6f879cc6b5c8071a55282c47d96bfa792dc7f9bff73575cb6035a1425c81f8a27d854ce313204c9060382039cd4f33cdeec1c8a9a3bfe721484ff78ef35dd9d029795f97337e2aa49e675c5b0557838ead59a08600fad21de9d2472e17f7d692e05cd0a95a446fbe58bf29d380c794cebc238aa7807e2df417a831e5f6dbe1248d4927f84e9fe7d606158952260046f026eb4fd1ad6e79e14ee4c1863924265c5219a332c0e76ab9f6621847ad05a36d5815971a9b6d7ab9297de536f", [[], [], [], [], [], [], [], []]}, 0x9a6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:32:59 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xfcfdffff00000000}], 0xc102, 0x0) 11:32:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xde) 11:32:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) getsockname$unix(r3, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r4 = getpgid(0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000001c0)=r4) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 992.522981] attempt to access beyond end of device [ 992.528093] loop5: rw=2049, want=7333, limit=63 [ 992.718902] hid-generic 0000:0000:0000.0127: ignoring exceeding usage max [ 992.756722] hid-generic 0000:0000:0000.0127: hidraw0: HID v0.00 Device [syz1] on %z5 [ 992.806479] attempt to access beyond end of device [ 992.812533] loop3: rw=1, want=2417, limit=63 11:33:00 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xfdfdffff00000000}], 0xc102, 0x0) 11:33:00 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x6800000000000000}], 0xc102, 0x0) [ 993.226397] attempt to access beyond end of device 11:33:00 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xfeffffff00000000}], 0xc102, 0x0) [ 993.291314] loop4: rw=1, want=885, limit=63 11:33:00 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x6c00000000000000}], 0xc102, 0x0) 11:33:00 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xff0f000000000000}], 0xc102, 0x0) 11:33:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff85de008cbc26669e2b5c30249a8d170531a72bb559fb8d818c6a78634808df3e72c685c81c08b57715ab40f3d683452acde13cca28f4da38fd69adb5d7691f616a071c0bcb807fd79e413adda34800ba87ab156d2d44c073304d44550a02a253d7a59fe9c51d761097a521cb44657d44f33ec6604cb033ac3959c9530be6950032070f31f33bac99ca777ebcbef1e887e91935ce68e08583aa8c5a34fa474c7afae2335744c65425d6a58a3c63607", 0xc4}], 0x21, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 993.757852] attempt to access beyond end of device [ 993.786604] loop5: rw=2049, want=78, limit=63 [ 993.805051] attempt to access beyond end of device [ 993.816178] loop5: rw=2049, want=79, limit=63 [ 993.821213] attempt to access beyond end of device [ 993.844501] loop5: rw=2049, want=80, limit=63 [ 993.853689] attempt to access beyond end of device [ 993.879172] loop5: rw=2049, want=81, limit=63 [ 993.883908] attempt to access beyond end of device [ 993.900852] hid-generic 0000:0000:0000.0128: ignoring exceeding usage max [ 993.918431] loop5: rw=2049, want=114, limit=63 [ 993.931381] attempt to access beyond end of device [ 993.942427] hid-generic 0000:0000:0000.0128: hidraw0: HID v0.00 Device [syz1] on %z5 [ 993.969946] loop5: rw=2049, want=115, limit=63 [ 994.010148] attempt to access beyond end of device [ 994.026940] loop5: rw=2049, want=116, limit=63 [ 994.042546] attempt to access beyond end of device [ 994.054456] loop5: rw=2049, want=117, limit=63 [ 994.064912] attempt to access beyond end of device [ 994.075887] loop5: rw=2049, want=130, limit=63 [ 994.086179] attempt to access beyond end of device [ 994.096947] loop5: rw=2049, want=131, limit=63 [ 994.120881] attempt to access beyond end of device [ 994.141093] loop5: rw=2049, want=132, limit=63 [ 994.162375] attempt to access beyond end of device [ 994.189380] loop5: rw=2049, want=133, limit=63 11:33:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file1\x00', 0x141042, 0xba7b614d11231e7b) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f00000000c0)=0x54) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r1, 0x4000, 0x0, 0x4) 11:33:01 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x6e00000000000000}], 0xc102, 0x0) 11:33:01 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffff1f0000000000}], 0xc102, 0x0) 11:33:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x46) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x45, 0x0, 0x0, 0x0, &(0x7f0000000080)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x21, 0x3, 0x0, {0x1}}, 0x21) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000300)=""/157, 0x9d}, {&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/52, 0x34}, {&(0x7f0000000240)=""/77, 0x4d}, {&(0x7f00000003c0)=""/65, 0x41}, {&(0x7f00000004c0)=""/79, 0x4f}], 0x7, 0x3) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 994.213243] attempt to access beyond end of device [ 994.223726] loop5: rw=2049, want=4237, limit=63 [ 994.233832] attempt to access beyond end of device [ 994.239394] loop5: rw=2049, want=5165, limit=63 [ 994.525995] hid-generic 0000:0000:0000.0129: ignoring exceeding usage max [ 994.582287] hid-generic 0000:0000:0000.012A: ignoring exceeding usage max [ 994.601314] hid-generic 0000:0000:0000.0129: hidraw1: HID v0.00 Device [syz1] on %z5 11:33:01 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x7400000000000000}], 0xc102, 0x0) 11:33:01 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffffff7f00000000}], 0xc102, 0x0) [ 994.709083] hid-generic 0000:0000:0000.012A: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x47) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:02 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffffffff00000000}], 0xc102, 0x0) 11:33:02 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x7a00000000000000}], 0xc102, 0x0) [ 995.180675] hid-generic 0000:0000:0000.012B: ignoring exceeding usage max [ 995.222081] hid-generic 0000:0000:0000.012B: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="eb3c906d6b7cd82e666134000204010002000270fff892d70f7e6c04c72cae6dcd662c54ee9d9fdc996030b81e3b30a76195e2a4ad7de1716e95f4047913fd7d064a8f72963c1c9350941d73d08536644ff517cf7a427e264a9858b1f4", 0xfffffffffffffe90, 0x200}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x0, 0x8) fstat(r2, &(0x7f0000000180)) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) sendmsg$nl_netfilter(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x304ca00}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0x401, 0x70bd2d, 0x25dfdbfb, {0xc, 0x0, 0xa}, [@typed={0x8, 0x3e, 0x0, 0x0, @u32=0x400}, @typed={0x8, 0x3f, 0x0, 0x0, @ipv4=@local}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x5100d93afa1ab443) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 995.672301] attempt to access beyond end of device [ 995.737309] loop3: rw=1, want=909, limit=63 11:33:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file1\x00', 0x141042, 0xba7b614d11231e7b) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f00000000c0)=0x54) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r1, 0x4000, 0x0, 0x4) 11:33:03 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x7e00000000000000}], 0xc102, 0x0) 11:33:03 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffffffffffffffff}], 0xc102, 0x0) [ 995.777407] hid-generic 0000:0000:0000.012C: ignoring exceeding usage max [ 995.838179] hid-generic 0000:0000:0000.012C: hidraw0: HID v0.00 Device [syz1] on %z5 [ 995.969951] attempt to access beyond end of device [ 995.999185] loop5: rw=2049, want=78, limit=63 [ 996.030238] buffer_io_error: 62 callbacks suppressed [ 996.030248] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 996.067550] attempt to access beyond end of device [ 996.099175] loop5: rw=2049, want=79, limit=63 [ 996.122328] Buffer I/O error on dev loop5, logical block 78, lost async page write 11:33:03 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x7f00000000000000}], 0xc102, 0x0) 11:33:03 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) [ 996.230007] hid-generic 0000:0000:0000.012D: ignoring exceeding usage max [ 996.254821] attempt to access beyond end of device [ 996.280980] loop5: rw=2049, want=80, limit=63 [ 996.292752] hid-generic 0000:0000:0000.012D: hidraw1: HID v0.00 Device [syz1] on %z5 [ 996.354752] attempt to access beyond end of device [ 996.359880] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 996.365911] attempt to access beyond end of device [ 996.392428] loop3: rw=2049, want=78, limit=63 [ 996.412528] loop2: rw=1, want=1945, limit=63 [ 996.430104] attempt to access beyond end of device [ 996.447484] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 996.459493] attempt to access beyond end of device [ 996.466629] loop5: rw=2049, want=81, limit=63 [ 996.484858] hid-generic 0000:0000:0000.012E: ignoring exceeding usage max [ 996.486946] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 996.501981] loop2: rw=1, want=1958, limit=63 [ 996.504123] attempt to access beyond end of device 11:33:03 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc104, 0x0) [ 996.522547] loop3: rw=2049, want=79, limit=63 [ 996.532486] hid-generic 0000:0000:0000.012E: hidraw0: HID v0.00 Device [syz1] on %z5 [ 996.544549] Buffer I/O error on dev loop2, logical block 1957, lost async page write [ 996.562750] Buffer I/O error on dev loop3, logical block 78, lost async page write [ 996.592485] attempt to access beyond end of device [ 996.600721] attempt to access beyond end of device [ 996.612281] loop2: rw=1, want=1959, limit=63 [ 996.616017] attempt to access beyond end of device [ 996.618513] loop5: rw=2049, want=114, limit=63 [ 996.633479] Buffer I/O error on dev loop2, logical block 1958, lost async page write 11:33:03 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x7fffffffffffffff}], 0xc102, 0x0) [ 996.642351] Buffer I/O error on dev loop5, logical block 113, lost async page write [ 996.657218] attempt to access beyond end of device [ 996.659569] loop3: rw=2049, want=80, limit=63 [ 996.666892] loop2: rw=1, want=1960, limit=63 [ 996.671690] attempt to access beyond end of device [ 996.707581] Buffer I/O error on dev loop2, logical block 1959, lost async page write [ 996.720923] loop5: rw=2049, want=115, limit=63 [ 996.721730] attempt to access beyond end of device [ 996.744320] loop3: rw=2049, want=81, limit=63 [ 996.744395] attempt to access beyond end of device [ 996.758728] attempt to access beyond end of device [ 996.772419] attempt to access beyond end of device [ 996.778461] loop3: rw=2049, want=114, limit=63 [ 996.808097] loop2: rw=1, want=1961, limit=63 [ 996.827703] attempt to access beyond end of device [ 996.847485] attempt to access beyond end of device [ 996.847550] loop5: rw=2049, want=116, limit=63 [ 996.878740] loop3: rw=2049, want=115, limit=63 [ 996.889667] attempt to access beyond end of device [ 996.902863] loop2: rw=1, want=1998, limit=63 [ 996.908871] attempt to access beyond end of device [ 996.924025] loop5: rw=2049, want=117, limit=63 [ 996.935933] attempt to access beyond end of device [ 996.941793] loop3: rw=2049, want=116, limit=63 [ 996.952454] attempt to access beyond end of device [ 996.960058] loop2: rw=1, want=1999, limit=63 [ 996.973432] attempt to access beyond end of device [ 996.973439] attempt to access beyond end of device [ 996.987793] loop5: rw=2049, want=130, limit=63 [ 997.009391] loop3: rw=2049, want=117, limit=63 [ 997.018949] attempt to access beyond end of device [ 997.029903] loop2: rw=1, want=2000, limit=63 [ 997.037366] attempt to access beyond end of device [ 997.040737] loop5: rw=2049, want=131, limit=63 [ 997.051784] attempt to access beyond end of device [ 997.064573] attempt to access beyond end of device [ 997.067558] attempt to access beyond end of device [ 997.076911] loop3: rw=2049, want=130, limit=63 [ 997.087608] loop2: rw=1, want=2001, limit=63 [ 997.091889] attempt to access beyond end of device [ 997.097340] loop2: rw=2049, want=78, limit=63 [ 997.103642] loop5: rw=2049, want=132, limit=63 [ 997.109732] loop3: rw=2049, want=131, limit=63 [ 997.115073] attempt to access beyond end of device [ 997.118309] attempt to access beyond end of device [ 997.120116] attempt to access beyond end of device [ 997.130017] attempt to access beyond end of device [ 997.132583] loop5: rw=2049, want=133, limit=63 [ 997.140475] loop3: rw=2049, want=132, limit=63 [ 997.149698] attempt to access beyond end of device [ 997.156962] attempt to access beyond end of device [ 997.157738] loop2: rw=2049, want=79, limit=63 [ 997.161966] loop2: rw=1, want=2050, limit=63 [ 997.172940] loop3: rw=2049, want=133, limit=63 [ 997.180758] attempt to access beyond end of device [ 997.187482] loop5: rw=2049, want=4237, limit=63 [ 997.192465] attempt to access beyond end of device [ 997.193609] attempt to access beyond end of device [ 997.203903] loop2: rw=1, want=2051, limit=63 [ 997.211967] attempt to access beyond end of device [ 997.217233] loop3: rw=2049, want=157, limit=63 [ 997.221938] attempt to access beyond end of device [ 997.229227] loop2: rw=2049, want=80, limit=63 [ 997.230546] loop5: rw=2049, want=5589, limit=63 [ 997.234286] loop2: rw=1, want=2052, limit=63 [ 997.246444] attempt to access beyond end of device [ 997.251463] loop3: rw=2049, want=4173, limit=63 [ 997.255053] attempt to access beyond end of device 11:33:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x48) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x10000, 0xc1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x2000, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:04 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc105, 0x0) 11:33:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) statx(r0, &(0x7f0000000040)='./bus/../file0\x00', 0x100, 0x0, &(0x7f0000000180)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x14400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:04 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x8000000000000000}], 0xc102, 0x0) [ 997.261478] attempt to access beyond end of device [ 997.271945] loop2: rw=2049, want=81, limit=63 [ 997.285577] loop2: rw=1, want=2053, limit=63 [ 997.302514] attempt to access beyond end of device [ 997.338308] attempt to access beyond end of device [ 997.343048] loop2: rw=2049, want=130, limit=63 [ 997.355651] loop2: rw=1, want=2062, limit=63 [ 997.376679] attempt to access beyond end of device [ 997.419507] attempt to access beyond end of device [ 997.425094] loop2: rw=1, want=2063, limit=63 [ 997.432215] attempt to access beyond end of device [ 997.446892] attempt to access beyond end of device [ 997.467721] loop4: rw=1, want=325, limit=63 [ 997.470355] loop2: rw=2049, want=131, limit=63 [ 997.480172] loop2: rw=1, want=2064, limit=63 [ 997.501613] attempt to access beyond end of device [ 997.530820] attempt to access beyond end of device [ 997.538308] loop2: rw=2049, want=132, limit=63 [ 997.544467] loop2: rw=1, want=2065, limit=63 [ 997.568254] attempt to access beyond end of device [ 997.572786] attempt to access beyond end of device [ 997.595629] loop2: rw=2049, want=133, limit=63 [ 997.601354] loop2: rw=1, want=6161, limit=63 [ 997.613214] attempt to access beyond end of device [ 997.615515] attempt to access beyond end of device [ 997.623356] loop2: rw=1, want=6713, limit=63 [ 997.627018] loop2: rw=2049, want=142, limit=63 [ 997.639977] attempt to access beyond end of device [ 997.668031] loop2: rw=2049, want=143, limit=63 [ 997.678768] attempt to access beyond end of device [ 997.689406] loop2: rw=2049, want=144, limit=63 [ 997.699797] attempt to access beyond end of device [ 997.716088] loop2: rw=2049, want=145, limit=63 [ 997.732142] attempt to access beyond end of device [ 997.757416] attempt to access beyond end of device [ 997.766498] loop2: rw=2049, want=161, limit=63 [ 997.787941] loop3: rw=1, want=685, limit=63 11:33:05 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0x8cffffff00000000}], 0xc102, 0x0) 11:33:05 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) 11:33:05 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc106, 0x0) 11:33:05 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xbc26000000000000}], 0xc102, 0x0) 11:33:05 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc107, 0x0) 11:33:05 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) [ 998.150247] attempt to access beyond end of device [ 998.174670] loop4: rw=2049, want=78, limit=63 [ 998.196253] attempt to access beyond end of device [ 998.235080] loop4: rw=2049, want=79, limit=63 [ 998.257483] attempt to access beyond end of device [ 998.274866] loop4: rw=2049, want=80, limit=63 [ 998.295935] attempt to access beyond end of device [ 998.322754] loop4: rw=2049, want=81, limit=63 [ 998.345856] attempt to access beyond end of device [ 998.351072] loop4: rw=2049, want=114, limit=63 [ 998.372903] attempt to access beyond end of device [ 998.384555] loop4: rw=2049, want=115, limit=63 11:33:05 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) [ 998.392750] attempt to access beyond end of device [ 998.418216] loop4: rw=2049, want=116, limit=63 [ 998.419886] attempt to access beyond end of device [ 998.425683] attempt to access beyond end of device [ 998.433106] loop4: rw=2049, want=117, limit=63 [ 998.438740] attempt to access beyond end of device [ 998.444471] loop4: rw=2049, want=130, limit=63 [ 998.449584] attempt to access beyond end of device [ 998.455142] loop4: rw=2049, want=131, limit=63 [ 998.460280] attempt to access beyond end of device [ 998.465984] loop4: rw=2049, want=132, limit=63 [ 998.473150] attempt to access beyond end of device [ 998.478725] loop3: rw=2049, want=78, limit=63 [ 998.478992] loop4: rw=2049, want=133, limit=63 [ 998.485328] attempt to access beyond end of device [ 998.488457] attempt to access beyond end of device [ 998.498222] loop4: rw=2049, want=157, limit=63 [ 998.502072] loop3: rw=2049, want=79, limit=63 [ 998.513471] attempt to access beyond end of device [ 998.524477] loop4: rw=2049, want=4421, limit=63 [ 998.544296] attempt to access beyond end of device [ 998.552975] attempt to access beyond end of device [ 998.562464] attempt to access beyond end of device [ 998.562493] loop3: rw=2049, want=80, limit=63 [ 998.570028] loop5: rw=2049, want=78, limit=63 [ 998.583798] loop4: rw=2049, want=7149, limit=63 [ 998.593807] attempt to access beyond end of device [ 998.601839] attempt to access beyond end of device [ 998.613020] loop3: rw=2049, want=81, limit=63 [ 998.630639] attempt to access beyond end of device [ 998.633575] loop5: rw=2049, want=79, limit=63 [ 998.648217] attempt to access beyond end of device [ 998.651096] loop3: rw=2049, want=114, limit=63 [ 998.666836] loop5: rw=2049, want=80, limit=63 [ 998.676381] attempt to access beyond end of device [ 998.681475] loop5: rw=2049, want=81, limit=63 [ 998.686542] attempt to access beyond end of device [ 998.691629] loop5: rw=2049, want=130, limit=63 [ 998.695784] attempt to access beyond end of device [ 998.696802] attempt to access beyond end of device [ 998.702995] loop3: rw=2049, want=115, limit=63 [ 998.712262] loop5: rw=2049, want=131, limit=63 [ 998.722129] attempt to access beyond end of device [ 998.731852] attempt to access beyond end of device [ 998.738388] loop3: rw=2049, want=116, limit=63 [ 998.742623] loop5: rw=2049, want=132, limit=63 [ 998.743063] attempt to access beyond end of device [ 998.753499] attempt to access beyond end of device [ 998.765494] loop5: rw=2049, want=133, limit=63 [ 998.780499] loop3: rw=2049, want=117, limit=63 [ 998.787726] attempt to access beyond end of device [ 998.797469] attempt to access beyond end of device [ 998.803754] loop5: rw=2049, want=142, limit=63 [ 998.821478] attempt to access beyond end of device [ 998.851706] loop3: rw=2049, want=130, limit=63 [ 998.856279] loop5: rw=2049, want=143, limit=63 [ 998.868826] attempt to access beyond end of device [ 998.872258] attempt to access beyond end of device [ 998.885811] loop5: rw=2049, want=144, limit=63 [ 998.890579] attempt to access beyond end of device [ 998.909335] loop3: rw=2049, want=131, limit=63 [ 998.917256] loop5: rw=2049, want=145, limit=63 [ 998.921347] attempt to access beyond end of device [ 998.927370] attempt to access beyond end of device [ 998.928276] loop3: rw=2049, want=132, limit=63 [ 998.932457] loop5: rw=2049, want=4241, limit=63 [ 998.938163] attempt to access beyond end of device [ 998.946429] attempt to access beyond end of device [ 998.952150] loop5: rw=2049, want=5873, limit=63 [ 998.953286] loop3: rw=2049, want=133, limit=63 [ 998.973602] attempt to access beyond end of device [ 998.998135] loop3: rw=2049, want=157, limit=63 11:33:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x49) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:06 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xcc26000000000000}], 0xc102, 0x0) 11:33:06 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc10b, 0x0) [ 999.028512] attempt to access beyond end of device [ 999.048985] loop3: rw=2049, want=4781, limit=63 [ 999.091841] attempt to access beyond end of device [ 999.100292] loop3: rw=2049, want=5333, limit=63 11:33:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) bind$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r3, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) dup2(r3, r1) 11:33:06 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) 11:33:06 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf0ffffffffffffff}], 0xc102, 0x0) 11:33:06 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc10f, 0x0) 11:33:06 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) [ 999.453738] hid-generic 0000:0000:0000.012F: ignoring exceeding usage max [ 999.506694] hid-generic 0000:0000:0000.012F: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:06 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf4ffffff00000000}], 0xc102, 0x0) 11:33:06 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc110, 0x0) [ 999.649542] hid-generic 0000:0000:0000.0130: ignoring exceeding usage max 11:33:06 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) [ 999.693961] hid-generic 0000:0000:0000.0130: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1000.075975] hid-generic 0000:0000:0000.0131: ignoring exceeding usage max [ 1000.121234] hid-generic 0000:0000:0000.0131: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4a) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:07 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) 11:33:07 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf5ffffff00000000}], 0xc102, 0x0) 11:33:07 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc114, 0x0) 11:33:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000180)={{0x1, 0x0, 0x3, 0x3, 0x4}, 0x0, 0x7, 'id0\x00', 'timer0\x00', 0x0, 0x8000, 0x20, 0x6, 0x2}) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) ptrace$setopts(0x4200, 0x0, 0x2, 0x100042) ioctl$SIOCPNADDRESOURCE(r3, 0x89e0, &(0x7f0000000040)=0x81) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x0, 0x1000000, 0x0, 0x3}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) alarm(0x3) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(r1, 0x5016, 0x0) 11:33:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@remote={[], 0x3}, 0x9, 'geneve1\x00'}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:07 executing program 2: mknod$loop(0x0, 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) 11:33:07 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc11d, 0x0) 11:33:07 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf6ffffff00000000}], 0xc102, 0x0) [ 1000.690373] hid-generic 0000:0000:0000.0132: ignoring exceeding usage max [ 1000.703309] hid-generic 0000:0000:0000.0132: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:08 executing program 2: mknod$loop(0x0, 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) [ 1000.794165] attempt to access beyond end of device [ 1000.821467] loop3: rw=1, want=441, limit=63 11:33:08 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc11e, 0x0) 11:33:08 executing program 2: mknod$loop(0x0, 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) [ 1001.412405] attempt to access beyond end of device [ 1001.423627] loop5: rw=2049, want=78, limit=63 [ 1001.436272] buffer_io_error: 78 callbacks suppressed [ 1001.436283] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1001.467927] attempt to access beyond end of device [ 1001.485075] loop5: rw=2049, want=79, limit=63 [ 1001.499107] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1001.515055] attempt to access beyond end of device [ 1001.525657] loop5: rw=2049, want=80, limit=63 [ 1001.535915] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1001.553021] attempt to access beyond end of device [ 1001.560053] loop3: rw=2049, want=78, limit=63 [ 1001.564780] attempt to access beyond end of device [ 1001.569787] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 1001.578182] loop5: rw=2049, want=81, limit=63 [ 1001.582797] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1001.590683] attempt to access beyond end of device [ 1001.595960] loop3: rw=2049, want=79, limit=63 [ 1001.600619] attempt to access beyond end of device [ 1001.606354] Buffer I/O error on dev loop3, logical block 78, lost async page write [ 1001.614426] loop5: rw=2049, want=130, limit=63 [ 1001.619919] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 1001.628131] attempt to access beyond end of device [ 1001.636618] loop5: rw=2049, want=131, limit=63 [ 1001.641304] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 1001.641964] attempt to access beyond end of device [ 1001.652564] attempt to access beyond end of device [ 1001.659622] loop5: rw=2049, want=132, limit=63 [ 1001.664845] Buffer I/O error on dev loop5, logical block 131, lost async page write [ 1001.672918] attempt to access beyond end of device [ 1001.678559] loop5: rw=2049, want=133, limit=63 [ 1001.683243] Buffer I/O error on dev loop5, logical block 132, lost async page write [ 1001.691505] attempt to access beyond end of device [ 1001.696904] loop5: rw=2049, want=142, limit=63 [ 1001.701625] attempt to access beyond end of device [ 1001.707180] loop5: rw=2049, want=143, limit=63 [ 1001.712336] attempt to access beyond end of device [ 1001.717686] loop5: rw=2049, want=144, limit=63 [ 1001.719368] loop3: rw=2049, want=80, limit=63 [ 1001.722384] attempt to access beyond end of device [ 1001.735523] loop5: rw=2049, want=145, limit=63 [ 1001.740155] attempt to access beyond end of device [ 1001.756316] loop3: rw=2049, want=81, limit=63 [ 1001.762823] attempt to access beyond end of device [ 1001.780206] loop5: rw=2049, want=4241, limit=63 [ 1001.810060] attempt to access beyond end of device 11:33:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4b) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:09 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xf903000000000000}], 0xc102, 0x0) 11:33:09 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc103, 0x0) 11:33:09 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc123, 0x0) 11:33:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0xf, 0x80000, 0x2) sendmsg$AUDIT_USER(r2, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000003580)=ANY=[@ANYBLOB="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"], 0x1010}, 0x1, 0x0, 0x0, 0x400c4}, 0x40) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1001.835598] loop5: rw=2049, want=8337, limit=63 [ 1001.843009] attempt to access beyond end of device [ 1001.875057] loop5: rw=2049, want=8433, limit=63 [ 1002.110518] attempt to access beyond end of device [ 1002.115703] loop4: rw=1, want=913, limit=63 11:33:09 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc103, 0x0) 11:33:09 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xfbffffff00000000}], 0xc102, 0x0) 11:33:09 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc16d, 0x0) [ 1002.377548] attempt to access beyond end of device [ 1002.431219] loop3: rw=1, want=1537, limit=63 11:33:09 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc103, 0x0) 11:33:09 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xfcfdffff00000000}], 0xc102, 0x0) 11:33:10 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc1eb, 0x0) [ 1002.757179] attempt to access beyond end of device [ 1002.782403] loop4: rw=2049, want=78, limit=63 [ 1002.791597] attempt to access beyond end of device [ 1002.805536] loop4: rw=2049, want=79, limit=63 [ 1002.815640] attempt to access beyond end of device [ 1002.829723] loop4: rw=2049, want=80, limit=63 [ 1002.868968] attempt to access beyond end of device [ 1002.899612] loop4: rw=2049, want=81, limit=63 [ 1002.900538] attempt to access beyond end of device [ 1002.913868] attempt to access beyond end of device [ 1002.919422] loop3: rw=2049, want=78, limit=63 [ 1002.930929] loop4: rw=2049, want=130, limit=63 [ 1002.941524] attempt to access beyond end of device [ 1002.943214] attempt to access beyond end of device [ 1002.959628] loop4: rw=2049, want=131, limit=63 [ 1002.969978] attempt to access beyond end of device [ 1002.982687] loop3: rw=2049, want=79, limit=63 [ 1003.009050] attempt to access beyond end of device [ 1003.012083] loop4: rw=2049, want=132, limit=63 [ 1003.037695] loop3: rw=2049, want=80, limit=63 [ 1003.040913] attempt to access beyond end of device [ 1003.059707] attempt to access beyond end of device [ 1003.066350] loop4: rw=2049, want=133, limit=63 [ 1003.070212] loop3: rw=2049, want=81, limit=63 [ 1003.077521] attempt to access beyond end of device [ 1003.081318] attempt to access beyond end of device [ 1003.082619] loop3: rw=2049, want=130, limit=63 [ 1003.099668] attempt to access beyond end of device [ 1003.110465] loop3: rw=2049, want=131, limit=63 [ 1003.112226] loop4: rw=2049, want=142, limit=63 [ 1003.126491] attempt to access beyond end of device [ 1003.128323] attempt to access beyond end of device [ 1003.132543] loop3: rw=2049, want=132, limit=63 [ 1003.147289] loop4: rw=2049, want=143, limit=63 [ 1003.149414] attempt to access beyond end of device [ 1003.159955] attempt to access beyond end of device [ 1003.160714] loop3: rw=2049, want=133, limit=63 [ 1003.171158] loop4: rw=2049, want=144, limit=63 [ 1003.192414] attempt to access beyond end of device [ 1003.202334] loop3: rw=2049, want=142, limit=63 [ 1003.204531] attempt to access beyond end of device [ 1003.210738] attempt to access beyond end of device [ 1003.220223] loop3: rw=2049, want=143, limit=63 [ 1003.236898] loop4: rw=2049, want=145, limit=63 [ 1003.241629] attempt to access beyond end of device [ 1003.251135] attempt to access beyond end of device [ 1003.255454] attempt to access beyond end of device [ 1003.259787] loop3: rw=2049, want=144, limit=63 [ 1003.261618] loop4: rw=2049, want=161, limit=63 [ 1003.270796] loop5: rw=2049, want=78, limit=63 [ 1003.282313] attempt to access beyond end of device [ 1003.288323] attempt to access beyond end of device [ 1003.293278] loop5: rw=2049, want=79, limit=63 [ 1003.302439] attempt to access beyond end of device [ 1003.307727] loop4: rw=2049, want=4761, limit=63 [ 1003.313337] attempt to access beyond end of device [ 1003.322472] loop3: rw=2049, want=145, limit=63 [ 1003.327728] loop5: rw=2049, want=80, limit=63 [ 1003.332373] attempt to access beyond end of device [ 1003.339645] loop5: rw=2049, want=81, limit=63 [ 1003.345832] attempt to access beyond end of device [ 1003.353014] loop5: rw=2049, want=130, limit=63 [ 1003.359385] attempt to access beyond end of device [ 1003.364666] loop5: rw=2049, want=131, limit=63 [ 1003.369567] attempt to access beyond end of device [ 1003.374158] attempt to access beyond end of device [ 1003.374918] loop5: rw=2049, want=132, limit=63 [ 1003.386011] attempt to access beyond end of device [ 1003.390978] loop5: rw=2049, want=133, limit=63 [ 1003.396000] attempt to access beyond end of device [ 1003.400948] loop5: rw=2049, want=142, limit=63 [ 1003.403978] loop3: rw=2049, want=161, limit=63 [ 1003.406207] attempt to access beyond end of device [ 1003.415747] loop5: rw=2049, want=143, limit=63 [ 1003.420387] attempt to access beyond end of device [ 1003.426120] loop5: rw=2049, want=144, limit=63 [ 1003.430638] attempt to access beyond end of device [ 1003.430938] attempt to access beyond end of device [ 1003.441205] loop5: rw=2049, want=145, limit=63 [ 1003.451117] attempt to access beyond end of device [ 1003.456858] loop5: rw=2049, want=4241, limit=63 11:33:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4c) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:10 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc103, 0x0) 11:33:10 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2) 11:33:10 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xfdfdffff00000000}], 0xc102, 0x0) 11:33:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000080)='./bus\x00', 0x0) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1003.461783] loop3: rw=2049, want=3833, limit=63 [ 1003.466615] attempt to access beyond end of device [ 1003.466629] loop5: rw=2049, want=6809, limit=63 11:33:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x5) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @rand_addr=0x64010100}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2c8, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7fffffff, 0x4, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r3, r4/1000+60000}) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:10 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc103, 0x0) 11:33:11 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3) 11:33:11 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xfeffffff00000000}], 0xc102, 0x0) 11:33:11 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xc103, 0x0) 11:33:11 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xff0f000000000000}], 0xc102, 0x0) 11:33:11 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4) [ 1004.242789] attempt to access beyond end of device [ 1004.314406] loop3: rw=1, want=801, limit=63 [ 1004.625462] attempt to access beyond end of device [ 1004.642347] loop5: rw=2049, want=78, limit=63 [ 1004.659817] attempt to access beyond end of device [ 1004.677580] loop5: rw=2049, want=79, limit=63 [ 1004.686629] attempt to access beyond end of device [ 1004.702411] loop5: rw=2049, want=80, limit=63 [ 1004.712664] attempt to access beyond end of device [ 1004.723484] loop5: rw=2049, want=81, limit=63 [ 1004.732562] attempt to access beyond end of device [ 1004.739473] loop5: rw=2049, want=130, limit=63 [ 1004.750609] attempt to access beyond end of device [ 1004.756351] loop5: rw=2049, want=131, limit=63 [ 1004.761092] attempt to access beyond end of device [ 1004.799032] loop5: rw=2049, want=132, limit=63 [ 1004.812651] attempt to access beyond end of device [ 1004.844374] attempt to access beyond end of device [ 1004.849426] loop3: rw=2049, want=78, limit=63 [ 1004.854390] attempt to access beyond end of device [ 1004.858610] loop5: rw=2049, want=133, limit=63 [ 1004.859386] loop3: rw=2049, want=79, limit=63 [ 1004.869259] attempt to access beyond end of device [ 1004.874621] loop3: rw=2049, want=80, limit=63 [ 1004.879298] attempt to access beyond end of device [ 1004.885076] attempt to access beyond end of device [ 1004.890143] loop5: rw=2049, want=142, limit=63 [ 1004.895218] loop3: rw=2049, want=81, limit=63 [ 1004.899898] attempt to access beyond end of device [ 1004.905384] attempt to access beyond end of device [ 1004.910437] loop5: rw=2049, want=143, limit=63 [ 1004.916878] loop3: rw=2049, want=130, limit=63 [ 1004.921781] attempt to access beyond end of device [ 1004.927211] attempt to access beyond end of device [ 1004.932228] loop5: rw=2049, want=144, limit=63 [ 1004.937277] attempt to access beyond end of device [ 1004.938923] loop3: rw=2049, want=131, limit=63 [ 1004.942276] loop5: rw=2049, want=145, limit=63 [ 1004.951506] attempt to access beyond end of device [ 1004.959638] loop3: rw=2049, want=132, limit=63 [ 1004.968874] attempt to access beyond end of device [ 1004.981909] attempt to access beyond end of device [ 1004.987539] loop3: rw=2049, want=133, limit=63 [ 1005.005295] loop5: rw=2049, want=4241, limit=63 [ 1005.010611] attempt to access beyond end of device [ 1005.015357] attempt to access beyond end of device [ 1005.024089] loop3: rw=2049, want=142, limit=63 [ 1005.028852] loop5: rw=2049, want=4601, limit=63 [ 1005.035041] attempt to access beyond end of device 11:33:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4d) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:12 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc103, 0x0) 11:33:12 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffff1f0000000000}], 0xc102, 0x0) 11:33:12 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x5) 11:33:12 executing program 4: sched_yield() syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000400000000200000000000000000000000000000000001000000000200000000000000000000000100258d7a350000000000000000000054fe00000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a0000000000000000000009000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bcd1ee23364b10d6aad5102000031e30dee4a28054000393898804c41c2993fc67e0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e989aa668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf00000000009f2c0de9b63fff5f8f4046cfc4c7f31d4a28a2854b4d2addac10b3e73fb9562a63a687f05ffe9d4f9239572e91386b62ed6ac57051c89a2ce5db50eea69de1787e079dc935ebce5d6023a669"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) openat$cgroup_ro(r3, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/123) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1f, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x1}, 0x4000, 0xfffffffffffffffc, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x24441, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1005.057653] loop3: rw=2049, want=143, limit=63 [ 1005.064506] attempt to access beyond end of device [ 1005.069539] loop3: rw=2049, want=144, limit=63 [ 1005.074629] attempt to access beyond end of device [ 1005.079995] loop3: rw=2049, want=145, limit=63 [ 1005.085793] attempt to access beyond end of device [ 1005.091256] loop3: rw=2049, want=161, limit=63 [ 1005.120090] attempt to access beyond end of device [ 1005.144792] loop3: rw=2049, want=4897, limit=63 11:33:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @timestamp, @window={0x3, 0x2}, @window={0x3, 0x401, 0x6}, @window={0x3, 0x0, 0x2}, @window={0x3, 0x8, 0x7f58}], 0x7) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x4b36, 0x4ca00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2000000}, 0x0, 0x5, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1005.206608] attempt to access beyond end of device [ 1005.211865] loop3: rw=2049, want=8993, limit=63 [ 1005.223211] attempt to access beyond end of device [ 1005.242435] loop3: rw=2049, want=11049, limit=63 11:33:12 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc103, 0x0) 11:33:12 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6) 11:33:12 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffffff7f00000000}], 0xc102, 0x0) [ 1005.491742] attempt to access beyond end of device [ 1005.503829] loop4: rw=1, want=1941, limit=63 11:33:12 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc103, 0x0) 11:33:12 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7) 11:33:13 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xc103, 0x0) [ 1005.958213] hid-generic 0000:0000:0000.0133: ignoring exceeding usage max [ 1005.991074] hid-generic 0000:0000:0000.0133: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1006.022122] attempt to access beyond end of device [ 1006.058724] loop3: rw=1, want=1201, limit=63 [ 1006.396095] attempt to access beyond end of device [ 1006.434564] loop5: rw=2049, want=78, limit=63 [ 1006.453579] buffer_io_error: 66 callbacks suppressed [ 1006.453590] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1006.482039] attempt to access beyond end of device [ 1006.489828] loop5: rw=2049, want=79, limit=63 [ 1006.497751] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1006.508976] attempt to access beyond end of device [ 1006.518047] loop5: rw=2049, want=80, limit=63 [ 1006.522745] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1006.533113] attempt to access beyond end of device [ 1006.541998] loop5: rw=2049, want=81, limit=63 [ 1006.552530] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1006.561100] attempt to access beyond end of device [ 1006.566439] loop5: rw=2049, want=114, limit=63 [ 1006.571132] Buffer I/O error on dev loop5, logical block 113, lost async page write [ 1006.581963] attempt to access beyond end of device [ 1006.590308] loop5: rw=2049, want=115, limit=63 [ 1006.597880] Buffer I/O error on dev loop5, logical block 114, lost async page write [ 1006.609295] attempt to access beyond end of device [ 1006.617076] loop5: rw=2049, want=116, limit=63 [ 1006.621941] Buffer I/O error on dev loop5, logical block 115, lost async page write [ 1006.631088] attempt to access beyond end of device [ 1006.643196] loop5: rw=2049, want=117, limit=63 [ 1006.655056] Buffer I/O error on dev loop5, logical block 116, lost async page write [ 1006.662973] attempt to access beyond end of device [ 1006.682565] loop5: rw=2049, want=130, limit=63 [ 1006.687862] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 1006.696283] attempt to access beyond end of device [ 1006.701344] loop5: rw=2049, want=131, limit=63 [ 1006.706596] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 1006.720564] attempt to access beyond end of device [ 1006.734058] loop5: rw=2049, want=132, limit=63 [ 1006.738819] attempt to access beyond end of device [ 1006.744588] loop5: rw=2049, want=133, limit=63 [ 1006.755467] attempt to access beyond end of device [ 1006.760545] loop5: rw=2049, want=4237, limit=63 [ 1006.772949] attempt to access beyond end of device [ 1006.778428] loop5: rw=2049, want=8333, limit=63 11:33:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:14 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffffffff00000000}], 0xc102, 0x0) 11:33:14 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x9) 11:33:14 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xc103, 0x0) 11:33:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x9008, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1006.786975] attempt to access beyond end of device [ 1006.793025] loop5: rw=2049, want=9085, limit=63 11:33:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:14 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xc103, 0x0) [ 1007.177581] hid-generic 0000:0000:0000.0134: ignoring exceeding usage max 11:33:14 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xd) [ 1007.244245] hid-generic 0000:0000:0000.0134: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:14 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffffffffffff0700}], 0xc102, 0x0) 11:33:14 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0xc103, 0x0) 11:33:14 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xe) 11:33:15 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0xc103, 0x0) [ 1007.810030] hid-generic 0000:0000:0000.0135: ignoring exceeding usage max [ 1007.858607] hid-generic 0000:0000:0000.0135: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:15 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffffffffffffff7f}], 0xc102, 0x0) 11:33:15 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x10) 11:33:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0xdbd1, 0xaff, 0x9, 0x200000, 0x0, 0xffff}, 0x0, 0xa, 0xffffffffffffffff, 0x2) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) r4 = dup2(0xffffffffffffffff, r2) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x7}) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socketpair(0x27, 0x2, 0x7, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) acct(0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000300)={@ethernet={0x6, @local}, {&(0x7f0000000180)=""/208, 0xd0}, &(0x7f0000000080), 0x10}, 0xa0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x4, &(0x7f00000000c0)=[{0x9, 0x7, 0xff, 0x8245}, {0xe446, 0x81, 0x1, 0x7}, {0x55e, 0x7f, 0x9, 0x8}, {0x3, 0x6, 0x8, 0x7}]}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43ce, 0x3ba}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:15 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0xc103, 0x0) 11:33:15 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x19) [ 1008.454281] hid-generic 0000:0000:0000.0136: ignoring exceeding usage max [ 1008.474482] hid-generic 0000:0000:0000.0136: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1008.501819] attempt to access beyond end of device [ 1008.511583] loop4: rw=1, want=1289, limit=63 [ 1008.523366] attempt to access beyond end of device [ 1008.540930] loop3: rw=1, want=2161, limit=63 11:33:15 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0xc103, 0x0) [ 1008.550484] hid-generic 0000:0000:0000.0137: ignoring exceeding usage max 11:33:15 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xfffffffffffffff0}], 0xc102, 0x0) [ 1008.602520] hid-generic 0000:0000:0000.0137: hidraw1: HID v0.00 Device [syz1] on %z5 11:33:16 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1a) 11:33:16 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0xc103, 0x0) 11:33:16 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f, 0xffffffffffffffff}], 0xc102, 0x0) [ 1009.188803] hid-generic 0000:0000:0000.0138: ignoring exceeding usage max [ 1009.222898] hid-generic 0000:0000:0000.0138: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1009.302057] attempt to access beyond end of device [ 1009.326405] loop5: rw=2049, want=78, limit=63 [ 1009.343316] attempt to access beyond end of device [ 1009.373423] loop5: rw=2049, want=79, limit=63 [ 1009.378010] attempt to access beyond end of device [ 1009.382945] loop5: rw=2049, want=80, limit=63 [ 1009.401026] attempt to access beyond end of device [ 1009.410195] loop5: rw=2049, want=81, limit=63 [ 1009.415845] attempt to access beyond end of device [ 1009.420799] loop5: rw=2049, want=130, limit=63 [ 1009.433120] attempt to access beyond end of device [ 1009.439581] loop5: rw=2049, want=131, limit=63 [ 1009.452900] attempt to access beyond end of device [ 1009.461320] loop5: rw=2049, want=132, limit=63 [ 1009.467786] attempt to access beyond end of device [ 1009.472976] loop5: rw=2049, want=133, limit=63 [ 1009.490614] attempt to access beyond end of device [ 1009.497144] loop5: rw=2049, want=142, limit=63 [ 1009.501795] attempt to access beyond end of device [ 1009.508242] loop5: rw=2049, want=143, limit=63 [ 1009.512898] attempt to access beyond end of device [ 1009.519705] loop5: rw=2049, want=144, limit=63 [ 1009.532382] attempt to access beyond end of device [ 1009.545298] loop5: rw=2049, want=145, limit=63 [ 1009.569534] attempt to access beyond end of device [ 1009.579771] loop5: rw=2049, want=4241, limit=63 [ 1009.605998] attempt to access beyond end of device [ 1009.622532] loop5: rw=2049, want=5281, limit=63 11:33:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x50) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:16 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0xc103, 0x0) 11:33:16 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1b) 11:33:16 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) 11:33:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, 0xffffffffffffffff) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x6}, 0x16, 0x1) fchdir(r0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x418, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r2, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x3b, 0x9, 0x6e6, 0x6}, 0xfffffe30) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000140)={0xf000000, 0x0, 0x4, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9e0906, 0x820, [], @p_u16=&(0x7f0000000080)=0x5}}) ioctl$sock_x25_SIOCDELRT(r4, 0x890c, &(0x7f0000000180)={@remote={[], 0x1}, 0x6, 'gre0\x00'}) 11:33:17 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb8", 0x5}], 0xc103, 0x0) 11:33:17 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1c) [ 1009.890994] hid-generic 0000:0000:0000.0139: ignoring exceeding usage max [ 1009.899896] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1009.959276] hid-generic 0000:0000:0000.0139: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1009.969257] attempt to access beyond end of device [ 1009.980010] loop4: rw=1, want=785, limit=63 [ 1010.041039] hid-generic 0000:0000:0000.013A: ignoring exceeding usage max [ 1010.067315] hid-generic 0000:0000:0000.013B: ignoring exceeding usage max [ 1010.074871] hid-generic 0000:0000:0000.013A: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./file1\x00', 0x141402, 0x80) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1010.099638] hid-generic 0000:0000:0000.013B: hidraw1: HID v0.00 Device [syz1] on %z5 11:33:17 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb8", 0x5}], 0xc103, 0x0) [ 1010.153458] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:17 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc104, 0x0) 11:33:17 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1d) [ 1010.509936] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1010.664301] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1010.679531] hid-generic 0000:0000:0000.013C: ignoring exceeding usage max [ 1010.719592] hid-generic 0000:0000:0000.013C: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x51) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:18 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb8", 0x5}], 0xc103, 0x0) 11:33:18 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc10a, 0x0) 11:33:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f0000000040)={0x2, 0x6}) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1011.152405] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000040)) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:18 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1e) 11:33:18 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c0000", 0x8}], 0xc103, 0x0) [ 1011.212266] hid-generic 0000:0000:0000.013D: ignoring exceeding usage max [ 1011.220690] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1011.254594] hid-generic 0000:0000:0000.013D: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:18 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc10f, 0x0) [ 1011.321037] attempt to access beyond end of device [ 1011.328742] loop3: rw=1, want=573, limit=63 11:33:18 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c0000", 0x8}], 0xc103, 0x0) 11:33:18 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x21) [ 1011.526459] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:18 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c0000", 0x8}], 0xc103, 0x0) [ 1011.633143] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1011.660966] hid-generic 0000:0000:0000.013E: ignoring exceeding usage max [ 1011.662396] attempt to access beyond end of device [ 1011.711422] hid-generic 0000:0000:0000.013E: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1011.723533] loop4: rw=1, want=989, limit=63 11:33:19 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc110, 0x0) [ 1011.978510] hid-generic 0000:0000:0000.013F: ignoring exceeding usage max [ 1012.017185] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1012.024319] hid-generic 0000:0000:0000.013F: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1012.092454] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1012.325574] attempt to access beyond end of device [ 1012.364201] loop5: rw=2049, want=78, limit=63 [ 1012.378562] buffer_io_error: 14 callbacks suppressed [ 1012.378572] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1012.474777] attempt to access beyond end of device [ 1012.479841] loop5: rw=2049, want=79, limit=63 [ 1012.504323] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1012.533599] attempt to access beyond end of device [ 1012.539950] loop5: rw=2049, want=80, limit=63 [ 1012.553467] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1012.568555] attempt to access beyond end of device [ 1012.592101] loop5: rw=2049, want=81, limit=63 [ 1012.608874] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1012.618997] attempt to access beyond end of device [ 1012.625981] loop5: rw=2049, want=114, limit=63 [ 1012.630779] Buffer I/O error on dev loop5, logical block 113, lost async page write [ 1012.640309] attempt to access beyond end of device [ 1012.646504] loop5: rw=2049, want=115, limit=63 [ 1012.651208] Buffer I/O error on dev loop5, logical block 114, lost async page write [ 1012.661095] attempt to access beyond end of device [ 1012.666922] loop5: rw=2049, want=116, limit=63 [ 1012.671611] Buffer I/O error on dev loop5, logical block 115, lost async page write [ 1012.681011] attempt to access beyond end of device [ 1012.686938] loop5: rw=2049, want=117, limit=63 [ 1012.691701] Buffer I/O error on dev loop5, logical block 116, lost async page write [ 1012.701775] attempt to access beyond end of device [ 1012.707612] loop5: rw=2049, want=130, limit=63 [ 1012.712374] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 1012.721720] attempt to access beyond end of device [ 1012.730087] loop5: rw=2049, want=131, limit=63 [ 1012.740325] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 1012.749551] attempt to access beyond end of device [ 1012.766904] loop5: rw=2049, want=132, limit=63 [ 1012.771629] attempt to access beyond end of device [ 1012.778338] loop5: rw=2049, want=133, limit=63 11:33:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x52) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:20 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x22) 11:33:20 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040", 0x9}], 0xc103, 0x0) 11:33:20 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc114, 0x0) 11:33:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={0xffffffffffffffff, r5, 0x13}, 0x10) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x2, 0x7, 0x801, 0x0, 0x0, {0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x93}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000881}, 0x4) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1012.796809] attempt to access beyond end of device [ 1012.801963] loop5: rw=2049, want=4237, limit=63 [ 1012.816703] attempt to access beyond end of device [ 1012.821743] loop5: rw=2049, want=6381, limit=63 [ 1012.965263] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:20 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040", 0x9}], 0xc103, 0x0) [ 1013.045043] hid-generic 0000:0000:0000.0140: ignoring exceeding usage max [ 1013.069474] hid-generic 0000:0000:0000.0140: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1013.074727] attempt to access beyond end of device [ 1013.100095] loop4: rw=1, want=669, limit=63 11:33:20 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x23) [ 1013.142587] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1013.169451] attempt to access beyond end of device [ 1013.178369] loop3: rw=1, want=501, limit=63 11:33:20 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc144, 0x0) 11:33:20 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040", 0x9}], 0xc103, 0x0) 11:33:20 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x24) [ 1013.506412] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:20 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0x0, 0x0) [ 1013.705408] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1013.744602] hid-generic 0000:0000:0000.0141: ignoring exceeding usage max [ 1013.759094] attempt to access beyond end of device [ 1013.785455] hid-generic 0000:0000:0000.0141: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1013.822779] hid-generic 0000:0000:0000.0142: ignoring exceeding usage max [ 1013.823064] loop4: rw=2049, want=78, limit=63 [ 1013.845190] hid-generic 0000:0000:0000.0142: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1013.898055] attempt to access beyond end of device [ 1013.917802] loop4: rw=2049, want=79, limit=63 [ 1013.924428] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1013.943498] attempt to access beyond end of device [ 1013.968655] loop4: rw=2049, want=80, limit=63 [ 1013.983330] attempt to access beyond end of device [ 1014.016393] loop4: rw=2049, want=81, limit=63 [ 1014.032693] attempt to access beyond end of device [ 1014.048920] loop4: rw=2049, want=114, limit=63 [ 1014.062559] attempt to access beyond end of device [ 1014.097850] loop4: rw=2049, want=115, limit=63 [ 1014.114961] attempt to access beyond end of device [ 1014.133012] loop4: rw=2049, want=116, limit=63 [ 1014.148263] attempt to access beyond end of device [ 1014.165719] loop4: rw=2049, want=117, limit=63 [ 1014.187552] attempt to access beyond end of device [ 1014.204459] loop4: rw=2049, want=130, limit=63 [ 1014.221224] attempt to access beyond end of device [ 1014.243555] loop4: rw=2049, want=131, limit=63 [ 1014.261414] attempt to access beyond end of device [ 1014.288308] loop4: rw=2049, want=132, limit=63 [ 1014.305896] attempt to access beyond end of device [ 1014.314191] attempt to access beyond end of device [ 1014.314198] loop4: rw=2049, want=133, limit=63 [ 1014.314297] attempt to access beyond end of device [ 1014.319158] loop5: rw=2049, want=78, limit=63 [ 1014.319197] attempt to access beyond end of device [ 1014.330724] loop4: rw=2049, want=157, limit=63 [ 1014.350312] attempt to access beyond end of device [ 1014.356654] loop4: rw=2049, want=4765, limit=63 [ 1014.375299] attempt to access beyond end of device [ 1014.380526] loop4: rw=2049, want=6445, limit=63 [ 1014.431393] loop5: rw=2049, want=79, limit=63 [ 1014.441920] attempt to access beyond end of device [ 1014.447494] loop5: rw=2049, want=80, limit=63 [ 1014.452138] attempt to access beyond end of device [ 1014.457201] loop5: rw=2049, want=81, limit=63 [ 1014.461778] attempt to access beyond end of device [ 1014.470720] loop5: rw=2049, want=114, limit=63 [ 1014.477665] attempt to access beyond end of device [ 1014.482624] loop5: rw=2049, want=115, limit=63 [ 1014.490742] attempt to access beyond end of device [ 1014.497374] loop5: rw=2049, want=116, limit=63 [ 1014.529558] attempt to access beyond end of device [ 1014.538567] loop5: rw=2049, want=117, limit=63 [ 1014.545799] attempt to access beyond end of device [ 1014.550788] loop5: rw=2049, want=130, limit=63 [ 1014.558507] attempt to access beyond end of device [ 1014.564037] loop5: rw=2049, want=131, limit=63 [ 1014.568701] attempt to access beyond end of device [ 1014.574107] loop5: rw=2049, want=132, limit=63 11:33:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x53) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:21 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2c) 11:33:21 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc17e, 0x0) 11:33:21 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0x0, 0x0) 11:33:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000a00)=""/242, &(0x7f0000000380)=0xf2) setresgid(0x0, r3, 0x0) setfsgid(r3) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x9, &(0x7f00000007c0)=[{&(0x7f0000000300)="ffe2a7a111599e44f0dd8600a1014afcf92e46bf614805d567faf78ace3b5a72eb27bb560ec5538b161e954091f1e687b16b28492dbf498447960d5013e31d42a5f57b70c3294ee2237166b095a7ba19c83f6e16ab2d1b", 0x57, 0x9}, {&(0x7f00000000c0)="82cabcf393f810962b4a3d6d68be330edc386604f0b965c326ab5c5c5fa7c32c563afd70096b45a4ca351896f2a9ecf373ce3c5a46249b4ebd7d", 0x3a, 0x6}, {&(0x7f0000000280)="ee6c74ef2a375ae995db14db", 0xc, 0x7}, {&(0x7f00000009c0)="acb1112fa1d20bb642988b6d2c98797b1ca850f1bfa09f8b8a4d30cbb2517df5806dd7", 0x23, 0x7fff}, {&(0x7f0000000580)="76e824a1f0d8f12c996f9b5bbb08429de2ca02039edf4d7638e35abdef5a5921a2a70a5d30bb07b880b594b76246d1ab7dbb5e8b679d55e034c6d0b07d44f4a7f61fb57f6986743bfefdcd93016b8063f9dcd8bfcd9e4c26d9ae8438f1cff0a344ff336ca09b8d29b34054d8e41d9c6811e4705d49134c0b833b9ea83bac37f24f15aaa759459a665531ff8d652adb32a83c692b3f68800439ac1ac803d68d4ac9c0b5c17c2730cb9f645ab6c91aed81c1b1d0915ee7dab142e2e40f69048225d47ed618724ef663da25dc559ff2a4ef9dc6582c4a84187dfce8", 0xda, 0x5}, {&(0x7f00000003c0)="592b30ff600a4e3aeb32ffe14312c6647a1d28920cedfe9969f4c931d35a5e8184a3acc570f06e3aec7d65d98cc8a958525f25d156a11ccfdde03bab76cb22ac6a938bcece1677b6df7d73b92369d50a46621967c41880dabcfcb102689c636fa54a7f1dc933a4a3e6634d8595c21515483d3bb880e6ce43b8547e0c", 0x7c, 0x80000000}, {&(0x7f0000000b00)="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"/308, 0x134, 0x100000001}, {&(0x7f0000000680)="11c114d5de17a42d27b95ab9ec255b1b43c83a55fecb6350c4ebdfca1be9642330f9974792a6a46f680061ea2693d7b0b834b200e6721dc7ce2dbddee9d060bfadec1fcea4c9c909d598c4c74e4f08b08ab1abf2bba0c04325fe178e3f3ce0feb84ac295c00c4590966e83c17ec1b7b6d8decdffffffffffffb4ed", 0x7b, 0x26ba9c9d}, {&(0x7f0000000700)="ac7039fd3aea2e14a9ac7f3ddf130f864f30ec6ffd094596cce1fcdccd0e70d3ae902455e469da1d638359f361fc6c0b408895041d9c2eb5543aa0b1202496699c84a3a2a4c8ad78dbf68b9d08502d6299975e127d5432c4ce7408821488bc7ff9380b7305e7cb7998d39bbba4c0df85a34510ef34c4f05f4e2e9463330d8ef7f8f2fb52e943178ac984d142c1a23b08f3d6d6632386f955a55f55f0e30359d459ae1a0286a4d9431a30c294534d11ac94253119d1f3490e6e89", 0xba, 0x6}], 0x800011, &(0x7f0000000c40)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r3, @ANYBLOB="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"]) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1218c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = semget$private(0x0, 0x3, 0x0) semop(r4, &(0x7f0000000240)=[{0x0, 0x44}, {}], 0x2) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000000000)=""/33) semctl$GETNCNT(r4, 0x2, 0xe, &(0x7f0000000180)=""/210) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x8) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1014.578736] attempt to access beyond end of device [ 1014.584177] loop5: rw=2049, want=133, limit=63 [ 1014.591547] attempt to access beyond end of device [ 1014.596563] loop5: rw=2049, want=4237, limit=63 [ 1014.615388] attempt to access beyond end of device [ 1014.620351] loop5: rw=2049, want=7453, limit=63 11:33:22 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc1eb, 0x0) [ 1014.748359] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1014.858371] attempt to access beyond end of device 11:33:22 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x36) [ 1014.883768] loop4: rw=1, want=677, limit=63 11:33:22 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0x0, 0x0) [ 1014.941024] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 1014.941024] The task syz-executor.3 (19617) triggered the difference, watch for misbehavior. [ 1015.004551] attempt to access beyond end of device [ 1015.045562] loop3: rw=1, want=1213, limit=63 11:33:22 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2) [ 1015.161790] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1015.246384] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:22 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x60) [ 1015.347140] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:22 executing program 2: sched_yield() syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) openat$cgroup_ro(r3, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/123) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1f, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x1}, 0x4000, 0xfffffffffffffffc, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x24441, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1015.508437] attempt to access beyond end of device [ 1015.535677] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1015.561483] loop4: rw=2049, want=78, limit=63 [ 1015.575908] FAT-fs (loop3): Filesystem has been set read-only [ 1015.586035] attempt to access beyond end of device [ 1015.600889] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1015.612372] loop4: rw=2049, want=79, limit=63 [ 1015.629718] attempt to access beyond end of device [ 1015.641954] attempt to access beyond end of device [ 1015.651945] loop4: rw=2049, want=80, limit=63 [ 1015.671626] loop3: rw=2049, want=78, limit=63 [ 1015.678701] attempt to access beyond end of device [ 1015.690192] attempt to access beyond end of device [ 1015.699308] loop4: rw=2049, want=81, limit=63 [ 1015.708319] loop3: rw=2049, want=79, limit=63 [ 1015.721793] attempt to access beyond end of device [ 1015.739323] attempt to access beyond end of device [ 1015.741522] attempt to access beyond end of device [ 1015.750249] loop4: rw=2049, want=114, limit=63 [ 1015.759917] loop2: rw=1, want=1981, limit=63 [ 1015.760324] loop3: rw=2049, want=80, limit=63 [ 1015.772676] attempt to access beyond end of device [ 1015.789257] attempt to access beyond end of device [ 1015.800122] loop4: rw=2049, want=115, limit=63 [ 1015.816712] loop3: rw=2049, want=81, limit=63 [ 1015.828613] attempt to access beyond end of device [ 1015.846526] attempt to access beyond end of device [ 1015.859635] loop4: rw=2049, want=116, limit=63 [ 1015.875627] loop3: rw=2049, want=114, limit=63 [ 1015.886247] attempt to access beyond end of device [ 1015.899675] attempt to access beyond end of device [ 1015.913196] loop4: rw=2049, want=117, limit=63 [ 1015.921726] loop3: rw=2049, want=115, limit=63 [ 1015.946511] attempt to access beyond end of device [ 1015.958532] attempt to access beyond end of device [ 1015.971585] loop4: rw=2049, want=130, limit=63 [ 1015.985932] loop3: rw=2049, want=116, limit=63 [ 1015.993986] attempt to access beyond end of device [ 1016.000630] attempt to access beyond end of device [ 1016.011870] loop4: rw=2049, want=131, limit=63 [ 1016.016866] loop3: rw=2049, want=117, limit=63 [ 1016.028903] attempt to access beyond end of device [ 1016.030367] attempt to access beyond end of device [ 1016.047902] loop3: rw=2049, want=130, limit=63 [ 1016.054928] loop4: rw=2049, want=132, limit=63 [ 1016.061658] attempt to access beyond end of device [ 1016.072251] attempt to access beyond end of device [ 1016.078393] loop3: rw=2049, want=131, limit=63 [ 1016.099048] attempt to access beyond end of device [ 1016.120590] loop4: rw=2049, want=133, limit=63 [ 1016.121740] loop3: rw=2049, want=132, limit=63 [ 1016.132045] attempt to access beyond end of device [ 1016.138201] attempt to access beyond end of device [ 1016.149781] loop4: rw=2049, want=157, limit=63 [ 1016.155013] loop3: rw=2049, want=133, limit=63 [ 1016.169786] attempt to access beyond end of device 11:33:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x54) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:23 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3) 11:33:23 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6d) [ 1016.195150] loop3: rw=2049, want=157, limit=63 [ 1016.206287] attempt to access beyond end of device [ 1016.234634] attempt to access beyond end of device [ 1016.235703] loop4: rw=2049, want=4669, limit=63 [ 1016.268024] loop3: rw=2049, want=5309, limit=63 [ 1016.291151] attempt to access beyond end of device [ 1016.307805] loop3: rw=2049, want=5357, limit=63 [ 1016.345420] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c90620666732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:23 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6e) 11:33:23 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4) 11:33:23 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7e) [ 1016.620904] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:23 executing program 2: mknod$loop(0x0, 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) [ 1016.778560] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x108, 0xa, 0x6, 0x3, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_ADT={0x20, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5}}]}, @IPSET_ATTR_ADT={0x68, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0xc6}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x55}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0xf5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x3}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x6c}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x10}}]}, @IPSET_ATTR_ADT={0x64, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x10001}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz1\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x9, 0x1a, 'vfat\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x3}}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x4000010}, 0x90) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000040)=0x9) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)={0x398, 0x0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x58, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xe7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20b}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf25}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_BEARER={0x164, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3f}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5ae4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaa}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffbff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x72d1}]}, @TIPC_NLA_BEARER={0xdc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000000}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}}}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER={0x30, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}]}, 0x398}, 0x1, 0x0, 0x0, 0x400c010}, 0x90) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:24 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x5) 11:33:24 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x104) [ 1017.070364] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1017.111728] attempt to access beyond end of device [ 1017.134777] loop3: rw=1, want=1029, limit=63 [ 1017.179185] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1017.179550] attempt to access beyond end of device [ 1017.237151] hid-generic 0000:0000:0000.0143: ignoring exceeding usage max [ 1017.243491] loop4: rw=1, want=757, limit=63 [ 1017.293223] hid-generic 0000:0000:0000.0143: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x55) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:24 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc103, 0x0) 11:33:24 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6) 11:33:24 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x204) [ 1017.797321] attempt to access beyond end of device [ 1017.809923] loop3: rw=2049, want=78, limit=63 [ 1017.816537] buffer_io_error: 50 callbacks suppressed [ 1017.816549] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 1017.838547] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1017.894257] hid-generic 0000:0000:0000.0144: ignoring exceeding usage max [ 1017.923348] attempt to access beyond end of device [ 1017.937618] hid-generic 0000:0000:0000.0144: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1017.958406] loop3: rw=2049, want=79, limit=63 [ 1017.973216] Buffer I/O error on dev loop3, logical block 78, lost async page write [ 1017.981105] attempt to access beyond end of device [ 1018.004134] attempt to access beyond end of device [ 1018.009141] loop4: rw=2049, want=78, limit=63 [ 1018.021709] loop3: rw=2049, want=80, limit=63 [ 1018.027168] Buffer I/O error on dev loop4, logical block 77, lost async page write [ 1018.037326] Buffer I/O error on dev loop3, logical block 79, lost async page write [ 1018.046889] attempt to access beyond end of device [ 1018.052125] attempt to access beyond end of device [ 1018.057202] loop4: rw=2049, want=79, limit=63 [ 1018.061770] loop3: rw=2049, want=81, limit=63 [ 1018.066490] Buffer I/O error on dev loop4, logical block 78, lost async page write [ 1018.074451] Buffer I/O error on dev loop3, logical block 80, lost async page write [ 1018.087945] attempt to access beyond end of device [ 1018.093970] attempt to access beyond end of device [ 1018.099032] loop4: rw=2049, want=80, limit=63 [ 1018.104087] loop3: rw=2049, want=114, limit=63 [ 1018.108821] Buffer I/O error on dev loop4, logical block 79, lost async page write [ 1018.117108] Buffer I/O error on dev loop3, logical block 113, lost async page write [ 1018.125214] attempt to access beyond end of device [ 1018.130325] attempt to access beyond end of device [ 1018.135632] loop4: rw=2049, want=81, limit=63 [ 1018.140271] loop3: rw=2049, want=115, limit=63 [ 1018.145634] Buffer I/O error on dev loop4, logical block 80, lost async page write [ 1018.159185] Buffer I/O error on dev loop3, logical block 114, lost async page write [ 1018.176031] attempt to access beyond end of device [ 1018.186590] loop3: rw=2049, want=116, limit=63 [ 1018.195800] attempt to access beyond end of device [ 1018.211637] loop3: rw=2049, want=117, limit=63 [ 1018.229246] attempt to access beyond end of device [ 1018.241362] loop3: rw=2049, want=130, limit=63 [ 1018.251896] attempt to access beyond end of device [ 1018.264404] loop3: rw=2049, want=131, limit=63 [ 1018.274779] attempt to access beyond end of device [ 1018.285508] loop3: rw=2049, want=132, limit=63 [ 1018.297584] attempt to access beyond end of device [ 1018.348310] loop3: rw=2049, want=133, limit=63 [ 1018.380319] attempt to access beyond end of device [ 1018.407994] loop3: rw=2049, want=157, limit=63 [ 1018.447274] attempt to access beyond end of device [ 1018.452330] loop3: rw=2049, want=5125, limit=63 [ 1018.512261] attempt to access beyond end of device [ 1018.534824] loop3: rw=2049, want=8549, limit=63 11:33:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) r2 = socket$pppl2tp(0x18, 0x1, 0x1) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./bus\x00', 0x6, 0x2) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:25 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7) 11:33:25 executing program 2: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc110, 0x0) 11:33:25 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x300) 11:33:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 1018.649344] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:26 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x304) 11:33:26 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x9) 11:33:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8490, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xf0000000000e803) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1018.817755] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1019.051465] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x56) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000040)=0x5, 0x4) fadvise64(r1, 0x4000, 0x0, 0x4) 11:33:26 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xd) [ 1019.192110] attempt to access beyond end of device [ 1019.213377] loop3: rw=1, want=661, limit=63 [ 1019.311402] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:26 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3f7) [ 1019.359642] hid-generic 0000:0000:0000.0145: ignoring exceeding usage max [ 1019.407467] attempt to access beyond end of device [ 1019.417161] hid-generic 0000:0000:0000.0145: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1019.458298] loop4: rw=1, want=1941, limit=63 [ 1019.478321] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1019.845972] attempt to access beyond end of device [ 1019.865351] loop4: rw=2049, want=78, limit=63 [ 1019.880760] attempt to access beyond end of device [ 1019.883532] attempt to access beyond end of device [ 1019.894556] loop3: rw=2049, want=78, limit=63 [ 1019.898242] loop4: rw=2049, want=79, limit=63 [ 1019.899146] attempt to access beyond end of device [ 1019.922520] attempt to access beyond end of device [ 1019.927770] loop4: rw=2049, want=80, limit=63 [ 1019.942684] attempt to access beyond end of device [ 1019.947702] loop3: rw=2049, want=79, limit=63 [ 1019.962520] attempt to access beyond end of device [ 1019.968018] loop3: rw=2049, want=80, limit=63 [ 1019.974330] loop4: rw=2049, want=81, limit=63 [ 1019.978932] attempt to access beyond end of device [ 1020.009623] loop4: rw=2049, want=114, limit=63 [ 1020.016121] attempt to access beyond end of device [ 1020.021096] loop3: rw=2049, want=81, limit=63 [ 1020.052491] attempt to access beyond end of device [ 1020.069436] attempt to access beyond end of device [ 1020.069629] loop4: rw=2049, want=115, limit=63 [ 1020.087111] loop3: rw=2049, want=114, limit=63 [ 1020.102485] attempt to access beyond end of device [ 1020.102503] attempt to access beyond end of device [ 1020.107445] loop4: rw=2049, want=116, limit=63 [ 1020.107491] attempt to access beyond end of device [ 1020.107502] loop4: rw=2049, want=117, limit=63 [ 1020.107537] attempt to access beyond end of device [ 1020.134743] loop3: rw=2049, want=115, limit=63 [ 1020.147455] loop4: rw=2049, want=130, limit=63 [ 1020.152462] attempt to access beyond end of device [ 1020.152477] loop3: rw=2049, want=116, limit=63 [ 1020.152520] attempt to access beyond end of device [ 1020.152531] loop3: rw=2049, want=117, limit=63 [ 1020.152577] attempt to access beyond end of device [ 1020.162664] attempt to access beyond end of device [ 1020.185074] loop4: rw=2049, want=131, limit=63 [ 1020.190560] loop3: rw=2049, want=130, limit=63 [ 1020.197171] attempt to access beyond end of device [ 1020.203462] attempt to access beyond end of device [ 1020.208612] loop3: rw=2049, want=131, limit=63 [ 1020.215197] loop4: rw=2049, want=132, limit=63 [ 1020.220231] attempt to access beyond end of device [ 1020.227233] attempt to access beyond end of device [ 1020.233275] loop3: rw=2049, want=132, limit=63 [ 1020.238063] loop4: rw=2049, want=133, limit=63 [ 1020.246051] attempt to access beyond end of device [ 1020.251379] attempt to access beyond end of device [ 1020.262532] loop3: rw=2049, want=133, limit=63 [ 1020.267538] loop4: rw=2049, want=157, limit=63 [ 1020.279707] attempt to access beyond end of device [ 1020.295698] attempt to access beyond end of device [ 1020.303787] loop3: rw=2049, want=157, limit=63 [ 1020.314704] loop4: rw=2049, want=4389, limit=63 [ 1020.351244] attempt to access beyond end of device [ 1020.361406] loop3: rw=2049, want=4757, limit=63 [ 1020.383956] attempt to access beyond end of device [ 1020.389098] loop3: rw=2049, want=4797, limit=63 11:33:27 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x402) 11:33:27 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xe) 11:33:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x38, r2, 0x1, 0x0, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x10}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4004081) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) signalfd4(r0, &(0x7f0000000200)={[0x8]}, 0x8, 0x0) r5 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)={0x14, r5, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x4000851) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r5, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x4050}, 0x4004000) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x60, 0x37, 0x8, 0x1}, {0x4, 0x40, 0xff, 0xffffffff}, {0x2, 0x2, 0x4, 0x7}, {0xfffc, 0x5, 0xc2, 0x80000001}, {0x9, 0x9, 0x4, 0x8000}, {0x7, 0x9, 0x2, 0x7d5}]}, 0x10) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x30, r5, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4109}, {0xec0, 0x18, {0x0, @bearer=@udp='udp:syz0\x00'}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x20, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8085}, 0x10002090) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$rxrpc(r0, &(0x7f0000000680)=""/208, 0xd0, 0x140, &(0x7f00000001c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x7, @remote, 0xfffffff7}}, 0x24) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/91, 0x5b, 0x20) [ 1020.537713] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:27 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x403) [ 1020.682103] hid-generic 0000:0000:0000.0146: ignoring exceeding usage max [ 1020.690830] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1020.712760] hid-generic 0000:0000:0000.0146: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:28 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xf) [ 1020.799942] attempt to access beyond end of device [ 1020.810426] attempt to access beyond end of device [ 1020.816109] loop5: rw=2049, want=78, limit=63 [ 1020.820692] loop2: rw=1, want=1857, limit=63 [ 1020.828943] attempt to access beyond end of device [ 1020.836661] loop5: rw=2049, want=79, limit=63 [ 1020.847375] attempt to access beyond end of device [ 1020.868041] loop5: rw=2049, want=80, limit=63 [ 1020.898942] attempt to access beyond end of device [ 1020.911378] hid-generic 0000:0000:0000.0147: ignoring exceeding usage max [ 1020.939774] loop5: rw=2049, want=81, limit=63 11:33:28 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x404) [ 1020.963298] attempt to access beyond end of device [ 1020.976637] hid-generic 0000:0000:0000.0147: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1021.011760] loop5: rw=2049, want=130, limit=63 [ 1021.020641] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1021.037173] attempt to access beyond end of device [ 1021.051492] attempt to access beyond end of device [ 1021.064274] loop5: rw=2049, want=131, limit=63 [ 1021.073982] loop3: rw=1, want=1301, limit=63 [ 1021.093017] attempt to access beyond end of device [ 1021.128694] loop5: rw=2049, want=132, limit=63 [ 1021.141050] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1021.156965] attempt to access beyond end of device [ 1021.187114] loop5: rw=2049, want=133, limit=63 [ 1021.212007] attempt to access beyond end of device [ 1021.318872] loop5: rw=2049, want=142, limit=63 [ 1021.337946] attempt to access beyond end of device [ 1021.359668] loop5: rw=2049, want=143, limit=63 [ 1021.381093] attempt to access beyond end of device [ 1021.404096] loop5: rw=2049, want=144, limit=63 [ 1021.423970] attempt to access beyond end of device [ 1021.441603] loop5: rw=2049, want=145, limit=63 [ 1021.477323] attempt to access beyond end of device [ 1021.495329] loop5: rw=2049, want=4241, limit=63 [ 1021.547008] attempt to access beyond end of device 11:33:28 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x10) 11:33:28 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x405) 11:33:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x57) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="dc3c906f040100020002061df8", 0xd, 0x6}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$input_event(r0, &(0x7f0000000040)={{0x77359400}, 0x1f, 0x100, 0x7}, 0x18) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYRES32=r1], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e20, 0xe54, @dev={0xfe, 0x80, [], 0x43}, 0xb}, @in={0x2, 0x4e23, @multicast1}], 0x3c) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6c, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000080)={r6, 0x2, 0x5}, &(0x7f00000000c0)=0x8) fadvise64(r1, 0x4000, 0x0, 0x4) [ 1021.570679] loop5: rw=2049, want=6817, limit=63 [ 1021.658374] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1021.720046] FAT-fs (loop2): invalid media value (0x00) [ 1021.739782] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1021.762735] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000400)='./file0\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) dup(0xffffffffffffffff) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000000200)={0x40000001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x24040, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000040)={{0x0, 0x2, 0x101, 0x2, 0x8}, 0xffff, 0x4}) 11:33:29 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x406) 11:33:29 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x22) 11:33:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000300)={0x0, 0x0, [], @bt={0x3, 0x9, 0x9, 0x1, 0xfab, 0x2, 0x7}}) 11:33:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x881) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x88080, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$NBD_DO_IT(r2, 0x1261) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r1, 0x4000, 0x0, 0x4) [ 1022.026868] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:29 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x407) [ 1022.123751] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:29 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x23) [ 1022.243694] attempt to access beyond end of device [ 1022.270507] attempt to access beyond end of device [ 1022.280734] loop2: rw=1, want=1017, limit=63 [ 1022.294736] loop3: rw=1, want=1089, limit=63 11:33:29 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x408) [ 1022.361540] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1022.444097] hid-generic 0000:0000:0000.0148: ignoring exceeding usage max [ 1022.504976] hid-generic 0000:0000:0000.0148: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1022.537581] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000300)={0x0, 0x0, [], @bt={0x3, 0x9, 0x9, 0x1, 0xfab, 0x2, 0x7}}) 11:33:29 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2c) [ 1022.803163] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1022.879346] attempt to access beyond end of device [ 1022.890680] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1022.898965] hid-generic 0000:0000:0000.0149: ignoring exceeding usage max [ 1022.917115] loop2: rw=2049, want=78, limit=63 [ 1022.928769] attempt to access beyond end of device [ 1022.934846] audit: type=1804 audit(1591443210.190:75): pid=20079 uid=0 auid=0 ses=5 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir423149610/syzkaller.X6Pcvt/631/file0/file0" dev="loop3" ino=1361 res=1 [ 1022.936070] attempt to access beyond end of device [ 1022.967570] hid-generic 0000:0000:0000.0149: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1022.972834] buffer_io_error: 42 callbacks suppressed [ 1022.972843] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 1022.992168] loop5: rw=2049, want=78, limit=63 [ 1022.998132] attempt to access beyond end of device [ 1023.005495] loop2: rw=2049, want=79, limit=63 [ 1023.010520] loop3: rw=2049, want=78, limit=63 [ 1023.017874] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1023.020381] Buffer I/O error on dev loop2, logical block 78, lost async page write [ 1023.039738] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 1023.059261] attempt to access beyond end of device [ 1023.061635] audit: type=1804 audit(1591443210.190:76): pid=20081 uid=0 auid=0 ses=5 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir423149610/syzkaller.X6Pcvt/631/file0/file0" dev="loop3" ino=1361 res=1 [ 1023.070203] loop5: rw=2049, want=79, limit=63 [ 1023.096493] attempt to access beyond end of device [ 1023.099982] attempt to access beyond end of device [ 1023.109202] loop3: rw=2049, want=79, limit=63 [ 1023.118126] Buffer I/O error on dev loop3, logical block 78, lost async page write [ 1023.128373] attempt to access beyond end of device [ 1023.128433] loop2: rw=2049, want=80, limit=63 [ 1023.137409] loop3: rw=2049, want=80, limit=63 [ 1023.144692] Buffer I/O error on dev loop2, logical block 79, lost async page write [ 1023.156627] Buffer I/O error on dev loop3, logical block 79, lost async page write [ 1023.161678] attempt to access beyond end of device [ 1023.166987] attempt to access beyond end of device [ 1023.173114] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1023.178545] loop3: rw=2049, want=81, limit=63 [ 1023.183776] loop2: rw=2049, want=81, limit=63 [ 1023.189388] Buffer I/O error on dev loop3, logical block 80, lost async page write [ 1023.196358] Buffer I/O error on dev loop2, logical block 80, lost async page write [ 1023.205802] attempt to access beyond end of device [ 1023.209080] attempt to access beyond end of device [ 1023.230157] loop5: rw=2049, want=80, limit=63 [ 1023.230713] attempt to access beyond end of device [ 1023.239514] attempt to access beyond end of device [ 1023.245935] loop3: rw=2049, want=130, limit=63 [ 1023.251172] loop2: rw=2049, want=130, limit=63 [ 1023.257245] attempt to access beyond end of device [ 1023.258737] loop5: rw=2049, want=81, limit=63 [ 1023.267618] attempt to access beyond end of device [ 1023.271524] attempt to access beyond end of device [ 1023.275426] loop3: rw=2049, want=131, limit=63 [ 1023.282407] loop5: rw=2049, want=130, limit=63 [ 1023.288536] attempt to access beyond end of device [ 1023.289820] loop2: rw=2049, want=131, limit=63 [ 1023.293912] loop5: rw=2049, want=131, limit=63 [ 1023.303481] attempt to access beyond end of device [ 1023.308558] loop5: rw=2049, want=132, limit=63 [ 1023.310573] attempt to access beyond end of device [ 1023.313959] attempt to access beyond end of device [ 1023.320289] attempt to access beyond end of device [ 1023.323645] loop5: rw=2049, want=133, limit=63 [ 1023.339826] loop2: rw=2049, want=132, limit=63 [ 1023.344558] loop3: rw=2049, want=132, limit=63 [ 1023.345960] attempt to access beyond end of device [ 1023.349183] attempt to access beyond end of device [ 1023.354608] loop5: rw=2049, want=142, limit=63 [ 1023.379323] attempt to access beyond end of device [ 1023.386838] attempt to access beyond end of device [ 1023.417663] loop2: rw=2049, want=133, limit=63 [ 1023.421151] loop5: rw=2049, want=143, limit=63 [ 1023.427657] attempt to access beyond end of device [ 1023.434039] loop5: rw=2049, want=144, limit=63 [ 1023.440017] attempt to access beyond end of device [ 1023.456025] loop3: rw=2049, want=133, limit=63 [ 1023.460695] attempt to access beyond end of device [ 1023.474937] attempt to access beyond end of device [ 1023.481849] loop2: rw=2049, want=142, limit=63 [ 1023.512016] loop5: rw=2049, want=145, limit=63 [ 1023.521294] attempt to access beyond end of device [ 1023.527751] attempt to access beyond end of device [ 1023.532511] loop3: rw=2049, want=142, limit=63 [ 1023.545145] loop2: rw=2049, want=143, limit=63 [ 1023.550883] attempt to access beyond end of device [ 1023.562794] attempt to access beyond end of device [ 1023.567885] loop3: rw=2049, want=143, limit=63 [ 1023.576350] loop5: rw=2049, want=4241, limit=63 [ 1023.577688] loop2: rw=2049, want=144, limit=63 [ 1023.588149] attempt to access beyond end of device [ 1023.598306] loop3: rw=2049, want=144, limit=63 [ 1023.604942] attempt to access beyond end of device [ 1023.608719] attempt to access beyond end of device [ 1023.610321] loop2: rw=2049, want=145, limit=63 [ 1023.626450] attempt to access beyond end of device [ 1023.631408] loop3: rw=2049, want=145, limit=63 [ 1023.637468] attempt to access beyond end of device [ 1023.648984] loop5: rw=2049, want=5441, limit=63 [ 1023.654288] loop2: rw=2049, want=161, limit=63 11:33:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x58) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:30 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x409) [ 1023.659234] attempt to access beyond end of device [ 1023.676771] attempt to access beyond end of device [ 1023.680658] loop3: rw=2049, want=161, limit=63 [ 1023.699741] loop2: rw=2049, want=5113, limit=63 [ 1023.709575] attempt to access beyond end of device [ 1023.718978] attempt to access beyond end of device [ 1023.736670] loop3: rw=2049, want=1305, limit=63 [ 1023.739241] loop2: rw=2049, want=5529, limit=63 [ 1023.750826] attempt to access beyond end of device [ 1023.795213] loop3: rw=2049, want=1318, limit=63 [ 1023.815614] attempt to access beyond end of device [ 1023.837609] loop3: rw=2049, want=1319, limit=63 [ 1023.859434] attempt to access beyond end of device [ 1023.889152] loop3: rw=2049, want=1320, limit=63 [ 1023.896058] attempt to access beyond end of device [ 1023.901025] loop3: rw=2049, want=1321, limit=63 [ 1023.910139] attempt to access beyond end of device [ 1023.918324] loop3: rw=2049, want=1358, limit=63 [ 1023.935182] attempt to access beyond end of device [ 1023.940136] loop3: rw=2049, want=1359, limit=63 [ 1023.946640] attempt to access beyond end of device [ 1023.951578] loop3: rw=2049, want=1360, limit=63 [ 1023.957161] attempt to access beyond end of device [ 1023.973050] loop3: rw=2049, want=1361, limit=63 [ 1023.977923] attempt to access beyond end of device [ 1023.984011] loop3: rw=2049, want=1410, limit=63 [ 1023.988746] attempt to access beyond end of device [ 1023.999066] loop3: rw=2049, want=1411, limit=63 [ 1024.009584] attempt to access beyond end of device [ 1024.022193] loop3: rw=2049, want=1412, limit=63 [ 1024.043783] attempt to access beyond end of device [ 1024.048750] loop3: rw=2049, want=1413, limit=63 [ 1024.076724] attempt to access beyond end of device [ 1024.106321] loop3: rw=2049, want=1422, limit=63 [ 1024.113704] attempt to access beyond end of device [ 1024.119200] loop3: rw=2049, want=1423, limit=63 [ 1024.125256] attempt to access beyond end of device [ 1024.130732] loop3: rw=2049, want=1424, limit=63 [ 1024.137278] attempt to access beyond end of device [ 1024.142825] loop3: rw=2049, want=1425, limit=63 11:33:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x560f652de6febfe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x8}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x8) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1024.153132] attempt to access beyond end of device [ 1024.158092] loop3: rw=2049, want=5521, limit=63 [ 1024.168094] attempt to access beyond end of device [ 1024.173976] loop3: rw=2049, want=6465, limit=63 11:33:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000300)={0x0, 0x0, [], @bt={0x3, 0x9, 0x9, 0x1, 0xfab, 0x2, 0x7}}) 11:33:31 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x48) 11:33:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x881) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x88080, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$NBD_DO_IT(r2, 0x1261) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r1, 0x4000, 0x0, 0x4) 11:33:31 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40a) [ 1024.306089] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1024.339612] hid-generic 0000:0000:0000.014A: ignoring exceeding usage max 11:33:31 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40b) [ 1024.396675] hid-generic 0000:0000:0000.014A: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:31 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4c) 11:33:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) [ 1024.693757] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:32 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x500) [ 1024.791698] attempt to access beyond end of device [ 1024.848990] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1024.858007] attempt to access beyond end of device [ 1024.877252] loop5: rw=2049, want=78, limit=63 [ 1024.895894] loop3: rw=1, want=501, limit=63 [ 1024.902324] attempt to access beyond end of device [ 1024.922123] hid-generic 0000:0000:0000.014B: ignoring exceeding usage max [ 1024.958240] loop5: rw=2049, want=79, limit=63 [ 1024.977892] hid-generic 0000:0000:0000.014B: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1024.995065] attempt to access beyond end of device [ 1025.018115] loop5: rw=2049, want=80, limit=63 [ 1025.040272] attempt to access beyond end of device 11:33:32 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x60) [ 1025.075511] loop5: rw=2049, want=81, limit=63 [ 1025.114393] attempt to access beyond end of device [ 1025.167965] loop5: rw=2049, want=130, limit=63 [ 1025.211188] attempt to access beyond end of device [ 1025.256041] loop5: rw=2049, want=131, limit=63 [ 1025.265406] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1025.296279] attempt to access beyond end of device [ 1025.349826] loop5: rw=2049, want=132, limit=63 [ 1025.381289] attempt to access beyond end of device [ 1025.393386] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1025.407752] loop5: rw=2049, want=133, limit=63 [ 1025.432137] attempt to access beyond end of device [ 1025.457340] loop5: rw=2049, want=142, limit=63 [ 1025.469137] attempt to access beyond end of device [ 1025.486250] attempt to access beyond end of device [ 1025.503269] loop3: rw=2049, want=78, limit=63 [ 1025.509508] loop5: rw=2049, want=143, limit=63 [ 1025.516848] attempt to access beyond end of device [ 1025.532118] loop3: rw=2049, want=79, limit=63 [ 1025.537954] attempt to access beyond end of device [ 1025.547914] attempt to access beyond end of device [ 1025.558299] loop5: rw=2049, want=144, limit=63 [ 1025.569811] loop3: rw=2049, want=80, limit=63 [ 1025.579034] attempt to access beyond end of device [ 1025.590910] attempt to access beyond end of device [ 1025.601782] loop5: rw=2049, want=145, limit=63 [ 1025.612157] loop3: rw=2049, want=81, limit=63 [ 1025.631364] attempt to access beyond end of device [ 1025.645780] attempt to access beyond end of device [ 1025.657543] loop3: rw=2049, want=114, limit=63 [ 1025.667926] loop5: rw=2049, want=4241, limit=63 [ 1025.705658] attempt to access beyond end of device [ 1025.715633] attempt to access beyond end of device [ 1025.720592] loop3: rw=2049, want=115, limit=63 [ 1025.721827] loop5: rw=2049, want=8337, limit=63 11:33:33 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x504) 11:33:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) [ 1025.750481] attempt to access beyond end of device [ 1025.754835] attempt to access beyond end of device [ 1025.766718] loop5: rw=2049, want=8649, limit=63 [ 1025.768845] loop3: rw=2049, want=116, limit=63 [ 1025.857438] attempt to access beyond end of device [ 1025.888189] loop3: rw=2049, want=117, limit=63 [ 1025.936553] attempt to access beyond end of device [ 1025.948475] hid-generic 0000:0000:0000.014C: ignoring exceeding usage max [ 1025.964488] loop3: rw=2049, want=130, limit=63 [ 1025.984456] attempt to access beyond end of device [ 1025.988708] hid-generic 0000:0000:0000.014C: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1026.001225] loop3: rw=2049, want=131, limit=63 [ 1026.028498] attempt to access beyond end of device [ 1026.057303] loop3: rw=2049, want=132, limit=63 [ 1026.078079] attempt to access beyond end of device [ 1026.083745] loop3: rw=2049, want=133, limit=63 [ 1026.091611] attempt to access beyond end of device [ 1026.107113] loop3: rw=2049, want=157, limit=63 [ 1026.115771] attempt to access beyond end of device [ 1026.138990] loop3: rw=2049, want=3061, limit=63 11:33:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:33 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x68) 11:33:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x59) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x881) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x88080, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$NBD_DO_IT(r2, 0x1261) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r1, 0x4000, 0x0, 0x4) 11:33:33 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x600) 11:33:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) dup2(0xffffffffffffffff, r4) [ 1026.224186] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:33 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6c) 11:33:33 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x604) [ 1026.478289] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1026.501818] hid-generic 0000:0000:0000.014D: ignoring exceeding usage max [ 1026.559240] hid-generic 0000:0000:0000.014D: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) dup2(0xffffffffffffffff, r4) [ 1026.663610] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:34 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6e) 11:33:34 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x700) 11:33:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000040)={0xe, {0x9, 0x40, 0xc9, 0x6b, "bd19cd1d584f33cd398999cb3c59dc467ea415c0e99445dee00a93ae2430774ab6bd2477c1ebc99cdfba35de81b80358b52f01298f5fb4ec8b87f862b0427f7b03108dd67866185677dac90b011e2fbaa1084db821426d696fdd4c8ab98ce65b6c444ab40cb557d35a8ac1"}}, 0x77) socket$inet_tcp(0x2, 0x1, 0x0) [ 1026.879902] hid-generic 0000:0000:0000.014E: ignoring exceeding usage max [ 1026.922610] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1026.923037] hid-generic 0000:0000:0000.014E: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:34 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x704) [ 1026.980917] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) dup2(0xffffffffffffffff, r4) [ 1027.111013] attempt to access beyond end of device [ 1027.126596] loop3: rw=1, want=413, limit=63 [ 1027.305151] hid-generic 0000:0000:0000.014F: ignoring exceeding usage max [ 1027.344315] hid-generic 0000:0000:0000.014F: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x5a) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:34 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x74) 11:33:34 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x804) 11:33:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) 11:33:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) [ 1027.730052] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) 11:33:35 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x900) [ 1027.842366] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1027.855978] attempt to access beyond end of device [ 1027.876875] loop3: rw=2049, want=78, limit=63 11:33:35 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7a) [ 1027.887910] attempt to access beyond end of device [ 1027.953321] loop3: rw=2049, want=79, limit=63 [ 1027.959271] hid-generic 0000:0000:0000.0150: ignoring exceeding usage max [ 1027.979492] attempt to access beyond end of device [ 1027.994352] hid-generic 0000:0000:0000.0150: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1028.011389] loop3: rw=2049, want=80, limit=63 [ 1028.024229] buffer_io_error: 68 callbacks suppressed [ 1028.024239] Buffer I/O error on dev loop3, logical block 79, lost async page write [ 1028.054827] attempt to access beyond end of device [ 1028.060466] loop3: rw=2049, want=81, limit=63 [ 1028.077891] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1028.087413] Buffer I/O error on dev loop3, logical block 80, lost async page write [ 1028.096618] attempt to access beyond end of device 11:33:35 executing program 2: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x23) [ 1028.118800] loop3: rw=2049, want=114, limit=63 [ 1028.138279] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1028.143255] Buffer I/O error on dev loop3, logical block 113, lost async page write [ 1028.182488] attempt to access beyond end of device [ 1028.206937] loop3: rw=2049, want=115, limit=63 [ 1028.213998] Buffer I/O error on dev loop3, logical block 114, lost async page write [ 1028.230398] attempt to access beyond end of device [ 1028.236534] loop3: rw=2049, want=116, limit=63 [ 1028.241136] Buffer I/O error on dev loop3, logical block 115, lost async page write [ 1028.255243] attempt to access beyond end of device [ 1028.260193] loop3: rw=2049, want=117, limit=63 [ 1028.267376] Buffer I/O error on dev loop3, logical block 116, lost async page write [ 1028.305241] attempt to access beyond end of device [ 1028.310213] loop3: rw=2049, want=130, limit=63 [ 1028.347455] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 1028.359661] attempt to access beyond end of device [ 1028.376050] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1028.409905] loop3: rw=2049, want=131, limit=63 [ 1028.435179] Buffer I/O error on dev loop3, logical block 130, lost async page write [ 1028.472202] attempt to access beyond end of device [ 1028.514955] loop3: rw=2049, want=132, limit=63 [ 1028.519824] Buffer I/O error on dev loop3, logical block 131, lost async page write [ 1028.556520] attempt to access beyond end of device [ 1028.577440] loop3: rw=2049, want=133, limit=63 [ 1028.584838] Buffer I/O error on dev loop3, logical block 132, lost async page write [ 1028.605984] attempt to access beyond end of device [ 1028.611277] loop3: rw=2049, want=157, limit=63 [ 1028.640618] attempt to access beyond end of device [ 1028.650085] attempt to access beyond end of device [ 1028.651274] loop3: rw=2049, want=4509, limit=63 [ 1028.660767] loop5: rw=2049, want=78, limit=63 [ 1028.666641] attempt to access beyond end of device [ 1028.668231] attempt to access beyond end of device [ 1028.677379] loop3: rw=2049, want=6549, limit=63 [ 1028.684385] loop5: rw=2049, want=79, limit=63 11:33:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:35 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x904) 11:33:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) [ 1028.688960] attempt to access beyond end of device [ 1028.704453] loop5: rw=2049, want=80, limit=63 [ 1028.716880] attempt to access beyond end of device [ 1028.756235] loop5: rw=2049, want=81, limit=63 [ 1028.761051] attempt to access beyond end of device [ 1028.771953] loop5: rw=2049, want=130, limit=63 [ 1028.794970] attempt to access beyond end of device [ 1028.816457] loop5: rw=2049, want=131, limit=63 [ 1028.826795] attempt to access beyond end of device [ 1028.841452] loop5: rw=2049, want=132, limit=63 [ 1028.854056] attempt to access beyond end of device [ 1028.865761] loop5: rw=2049, want=133, limit=63 [ 1028.890743] attempt to access beyond end of device [ 1028.898339] loop5: rw=2049, want=142, limit=63 [ 1028.913573] attempt to access beyond end of device [ 1028.918491] loop5: rw=2049, want=143, limit=63 [ 1028.923509] attempt to access beyond end of device [ 1028.928440] loop5: rw=2049, want=144, limit=63 [ 1028.942265] attempt to access beyond end of device [ 1028.947650] loop5: rw=2049, want=145, limit=63 [ 1028.958206] attempt to access beyond end of device [ 1028.968910] loop5: rw=2049, want=4241, limit=63 [ 1028.978701] attempt to access beyond end of device 11:33:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x20000, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./bus\x00') openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:36 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7e) 11:33:36 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xa04) 11:33:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x5b) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, 0xffffffffffffffff) [ 1028.990530] loop5: rw=2049, want=8337, limit=63 [ 1028.998919] attempt to access beyond end of device [ 1029.009449] loop5: rw=2049, want=9225, limit=63 [ 1029.076867] attempt to access beyond end of device [ 1029.101020] loop3: rw=1, want=493, limit=63 [ 1029.139322] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:36 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xf0) 11:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, 0xffffffffffffffff) 11:33:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x5) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x8001, 0x4, 0x81}) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) connect$unix(r1, &(0x7f0000000040)=@file={0x0, './bus\x00'}, 0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x6, 0x4, 0x9, 0x9, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r3, 0xffff}, &(0x7f0000000340)=0x8) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="870d000000000000c2040000100007500000000012010300010000000000000008000000000000000300000000000000020000000000000006000000000000000900000000000000090000000000000000ffffff0ea400003f00000000000000c91000000000000000000000ffff7f000001000000000000"], 0x78) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:36 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xb04) [ 1029.416022] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1029.486330] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1029.574392] attempt to access beyond end of device [ 1029.652932] loop2: rw=1, want=1181, limit=63 [ 1029.808446] attempt to access beyond end of device [ 1029.827438] loop3: rw=2049, want=78, limit=63 [ 1029.838346] attempt to access beyond end of device [ 1029.844170] loop3: rw=2049, want=79, limit=63 [ 1029.854667] attempt to access beyond end of device [ 1029.874876] loop3: rw=2049, want=80, limit=63 [ 1029.885369] attempt to access beyond end of device [ 1029.896642] loop3: rw=2049, want=81, limit=63 [ 1029.925956] attempt to access beyond end of device [ 1029.969013] loop3: rw=2049, want=114, limit=63 [ 1029.980745] attempt to access beyond end of device [ 1029.992040] loop3: rw=2049, want=115, limit=63 [ 1030.002314] attempt to access beyond end of device [ 1030.012897] loop3: rw=2049, want=116, limit=63 [ 1030.023799] attempt to access beyond end of device [ 1030.034374] loop3: rw=2049, want=117, limit=63 [ 1030.044650] attempt to access beyond end of device [ 1030.056378] loop3: rw=2049, want=130, limit=63 [ 1030.066694] attempt to access beyond end of device [ 1030.077364] loop3: rw=2049, want=131, limit=63 [ 1030.087744] attempt to access beyond end of device [ 1030.099585] loop3: rw=2049, want=132, limit=63 [ 1030.109309] attempt to access beyond end of device [ 1030.121113] loop3: rw=2049, want=133, limit=63 [ 1030.130972] attempt to access beyond end of device [ 1030.142214] loop3: rw=2049, want=157, limit=63 [ 1030.164086] attempt to access beyond end of device [ 1030.174702] loop3: rw=2049, want=4589, limit=63 [ 1030.193015] attempt to access beyond end of device [ 1030.204715] loop3: rw=2049, want=5541, limit=63 11:33:37 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x300) 11:33:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x4000, 0x0, 0x4) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, 0xffffffffffffffff) 11:33:37 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xd00) [ 1030.234017] attempt to access beyond end of device [ 1030.270665] loop2: rw=2049, want=78, limit=63 [ 1030.289178] attempt to access beyond end of device [ 1030.299977] loop2: rw=2049, want=79, limit=63 [ 1030.308540] attempt to access beyond end of device 11:33:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x940082, 0x0) io_setup(0xa65, &(0x7f0000000280)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) io_cancel(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x81, r1, &(0x7f0000002480)="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", 0x1000, 0x4, 0x0, 0x2, r5}, &(0x7f0000000080)) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x44, 0x0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)={0x50, 0x0, 0x0, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x50}, 0x1, 0x0, 0x0, 0xc000}, 0x24008810) [ 1030.323600] loop2: rw=2049, want=80, limit=63 [ 1030.369308] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1030.377905] attempt to access beyond end of device [ 1030.410358] loop2: rw=2049, want=81, limit=63 11:33:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:37 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xe00) [ 1030.434092] attempt to access beyond end of device [ 1030.456938] loop2: rw=2049, want=114, limit=63 [ 1030.466170] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1030.468340] attempt to access beyond end of device [ 1030.488488] loop2: rw=2049, want=115, limit=63 [ 1030.525789] attempt to access beyond end of device [ 1030.550266] loop2: rw=2049, want=116, limit=63 [ 1030.568819] attempt to access beyond end of device [ 1030.589077] loop2: rw=2049, want=117, limit=63 [ 1030.604175] attempt to access beyond end of device [ 1030.604258] attempt to access beyond end of device [ 1030.609792] loop2: rw=2049, want=130, limit=63 [ 1030.625119] attempt to access beyond end of device [ 1030.630507] loop5: rw=2049, want=78, limit=63 [ 1030.630574] loop2: rw=2049, want=131, limit=63 [ 1030.639694] attempt to access beyond end of device [ 1030.642650] attempt to access beyond end of device [ 1030.648038] loop5: rw=2049, want=79, limit=63 [ 1030.650407] loop2: rw=2049, want=132, limit=63 [ 1030.660129] attempt to access beyond end of device [ 1030.668144] loop2: rw=2049, want=133, limit=63 [ 1030.674322] attempt to access beyond end of device [ 1030.679548] loop2: rw=2049, want=157, limit=63 [ 1030.690621] attempt to access beyond end of device [ 1030.696580] loop2: rw=2049, want=5277, limit=63 [ 1030.736271] hid-generic 0000:0000:0000.0151: ignoring exceeding usage max [ 1030.744684] attempt to access beyond end of device [ 1030.756408] attempt to access beyond end of device [ 1030.765058] loop2: rw=2049, want=9373, limit=63 [ 1030.775168] hid-generic 0000:0000:0000.0151: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1030.793976] attempt to access beyond end of device [ 1030.799495] loop5: rw=2049, want=80, limit=63 [ 1030.820068] attempt to access beyond end of device [ 1030.834449] loop2: rw=2049, want=10477, limit=63 [ 1030.848186] loop5: rw=2049, want=81, limit=63 [ 1030.870026] attempt to access beyond end of device [ 1030.919152] hid-generic 0000:0000:0000.0152: ignoring exceeding usage max [ 1030.927046] loop5: rw=2049, want=130, limit=63 [ 1030.949588] attempt to access beyond end of device [ 1030.979828] hid-generic 0000:0000:0000.0152: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1030.997515] loop5: rw=2049, want=131, limit=63 [ 1030.999939] attempt to access beyond end of device [ 1031.016896] loop3: rw=1, want=1109, limit=63 [ 1031.030087] attempt to access beyond end of device [ 1031.041813] loop5: rw=2049, want=132, limit=63 [ 1031.046483] attempt to access beyond end of device [ 1031.092047] loop5: rw=2049, want=133, limit=63 [ 1031.096728] attempt to access beyond end of device [ 1031.131162] loop5: rw=2049, want=142, limit=63 [ 1031.135850] attempt to access beyond end of device [ 1031.140805] loop5: rw=2049, want=143, limit=63 [ 1031.161409] attempt to access beyond end of device [ 1031.166389] loop5: rw=2049, want=144, limit=63 [ 1031.171042] attempt to access beyond end of device [ 1031.190648] loop5: rw=2049, want=145, limit=63 [ 1031.221650] attempt to access beyond end of device [ 1031.227319] loop5: rw=2049, want=4241, limit=63 [ 1031.255660] attempt to access beyond end of device [ 1031.260645] loop5: rw=2049, want=8337, limit=63 [ 1031.277172] attempt to access beyond end of device [ 1031.287409] loop5: rw=2049, want=9977, limit=63 11:33:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x5c) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:38 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3f9) 11:33:38 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1900) 11:33:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x5) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x8001, 0x4, 0x81}) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) connect$unix(r1, &(0x7f0000000040)=@file={0x0, './bus\x00'}, 0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x6, 0x4, 0x9, 0x9, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r3, 0xffff}, &(0x7f0000000340)=0x8) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="870d000000000000c2040000100007500000000012010300010000000000000008000000000000000300000000000000020000000000000006000000000000000900000000000000090000000000000000ffffff0ea400003f00000000000000c91000000000000000000000ffff7f000001000000000000"], 0x78) dup2(0xffffffffffffffff, 0xffffffffffffffff) 11:33:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:38 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x404) [ 1031.404781] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1031.504627] hid-generic 0000:0000:0000.0153: ignoring exceeding usage max 11:33:38 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1a00) [ 1031.555581] hid-generic 0000:0000:0000.0153: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1031.576554] attempt to access beyond end of device [ 1031.578275] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1031.588915] loop2: rw=1, want=629, limit=63 11:33:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) [ 1031.716188] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:39 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x405) 11:33:39 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1b00) 11:33:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x13, &(0x7f0000000100)) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="00fbb70200ddb8303794713fa075dabcfd7cea4de5c3cb6cee2c2a04d32dffc2a757caec7053b609fd46b4a0a8a20261d96a75ebceffc875e91d15705134c3b6344a6410c85041c5d4a3fdccb47e830859c54c1c9a8bc2e88a54557aab37a403ac94dcf9ae64ab5f0f7f400a7d783f5123590f7d38c82a39fe53ebf6c10c106e8e670dfdd70c76cc861665dbcbfc0df017f12369ada5df902a162642c61f85e97d3196cc3b89e705d42dd70445d6a655f413dcb1927ecf"], 0xb7, 0x0) sendto$l2tp6(r0, &(0x7f0000000180)="c8190306ab962048db848ce37d0bac3d30ac56ac66fe97b310a75fb2071e846ccca6c4aca353cea57d068e2dc85b28a4b00a5b4c6385f21c20b071cd75a5f147fc915422410656e913243936a05b4e0ac46951d1ad55e407754a952b88d0065323967dd10a0b4469b699ee21c9d1b534758c8911381c47186b0b6c26d98f4d4cf75f0ba23e3acb507d4f7fe12df3aa3f4e38a641ad4851a6f5a45bd3421d", 0x9e, 0x20000000, &(0x7f0000000240)={0xa, 0x0, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfff, 0x3}, 0x20) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0xc0, 0x81, 0x1, 0x0, 0x7, 0x3bc09, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x10002, 0x2, 0x8, 0x7, 0x8, 0x200, 0x4}, r2, 0x6, 0xffffffffffffffff, 0x2) [ 1031.982824] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1032.011696] hid-generic 0000:0000:0000.0154: ignoring exceeding usage max [ 1032.064535] hid-generic 0000:0000:0000.0154: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1032.112884] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) [ 1032.248399] attempt to access beyond end of device [ 1032.275396] loop2: rw=2049, want=78, limit=63 [ 1032.301370] attempt to access beyond end of device [ 1032.324171] loop2: rw=2049, want=79, limit=63 [ 1032.339351] attempt to access beyond end of device [ 1032.350706] attempt to access beyond end of device [ 1032.356943] loop2: rw=2049, want=80, limit=63 [ 1032.357001] attempt to access beyond end of device [ 1032.357012] loop2: rw=2049, want=81, limit=63 [ 1032.357075] attempt to access beyond end of device [ 1032.357086] loop2: rw=2049, want=114, limit=63 [ 1032.357127] attempt to access beyond end of device [ 1032.357137] loop2: rw=2049, want=115, limit=63 [ 1032.357177] attempt to access beyond end of device [ 1032.357187] loop2: rw=2049, want=116, limit=63 [ 1032.357223] attempt to access beyond end of device [ 1032.357233] loop2: rw=2049, want=117, limit=63 [ 1032.357268] attempt to access beyond end of device [ 1032.357279] loop2: rw=2049, want=130, limit=63 [ 1032.357315] attempt to access beyond end of device [ 1032.357324] loop2: rw=2049, want=131, limit=63 [ 1032.357360] attempt to access beyond end of device [ 1032.357369] loop2: rw=2049, want=132, limit=63 [ 1032.357411] attempt to access beyond end of device [ 1032.357420] loop2: rw=2049, want=133, limit=63 [ 1032.357512] attempt to access beyond end of device [ 1032.357523] loop2: rw=2049, want=157, limit=63 [ 1032.384352] attempt to access beyond end of device [ 1032.442601] loop3: rw=1, want=785, limit=63 [ 1032.515906] hid-generic 0000:0000:0000.0155: ignoring exceeding usage max [ 1032.559608] hid-generic 0000:0000:0000.0155: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1032.673377] loop2: rw=2049, want=4725, limit=63 [ 1032.708737] attempt to access beyond end of device [ 1032.720143] loop2: rw=2049, want=7517, limit=63 [ 1032.865310] attempt to access beyond end of device [ 1032.875997] loop5: rw=2049, want=78, limit=63 [ 1032.887827] attempt to access beyond end of device [ 1032.899736] loop5: rw=2049, want=79, limit=63 [ 1032.910272] attempt to access beyond end of device [ 1032.921589] loop5: rw=2049, want=80, limit=63 [ 1032.930792] attempt to access beyond end of device [ 1032.944116] loop5: rw=2049, want=81, limit=63 [ 1032.955045] attempt to access beyond end of device [ 1032.966184] loop5: rw=2049, want=130, limit=63 [ 1032.976755] attempt to access beyond end of device [ 1032.987623] loop5: rw=2049, want=131, limit=63 [ 1033.012522] attempt to access beyond end of device [ 1033.023360] loop5: rw=2049, want=132, limit=63 [ 1033.037907] buffer_io_error: 66 callbacks suppressed [ 1033.037920] Buffer I/O error on dev loop5, logical block 131, lost async page write [ 1033.053180] attempt to access beyond end of device [ 1033.058377] loop5: rw=2049, want=133, limit=63 [ 1033.064970] Buffer I/O error on dev loop5, logical block 132, lost async page write [ 1033.082121] attempt to access beyond end of device [ 1033.087242] loop5: rw=2049, want=142, limit=63 [ 1033.094886] Buffer I/O error on dev loop5, logical block 141, lost async page write [ 1033.118524] attempt to access beyond end of device [ 1033.126407] loop5: rw=2049, want=143, limit=63 [ 1033.132248] Buffer I/O error on dev loop5, logical block 142, lost async page write [ 1033.143310] attempt to access beyond end of device [ 1033.161158] loop5: rw=2049, want=144, limit=63 [ 1033.170443] Buffer I/O error on dev loop5, logical block 143, lost async page write [ 1033.190583] attempt to access beyond end of device [ 1033.196724] loop5: rw=2049, want=145, limit=63 [ 1033.206724] Buffer I/O error on dev loop5, logical block 144, lost async page write [ 1033.239813] attempt to access beyond end of device [ 1033.268415] loop5: rw=2049, want=4241, limit=63 [ 1033.288361] attempt to access beyond end of device [ 1033.313576] loop5: rw=2049, want=8337, limit=63 [ 1033.326565] attempt to access beyond end of device [ 1033.331767] loop5: rw=2049, want=8625, limit=63 11:33:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x5d) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:40 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x406) 11:33:40 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1c00) 11:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) getuid() fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./bus/file0\x00', 0x49, 0x6, &(0x7f0000000380)=[{&(0x7f00000000c0)="e6b7fc0001c53e650dc17d97c295b1c02f6f2c52fe400dbc03cfd088df444647188b1bf3d91c71caa36fb9b7a020a58aa8986af882", 0x35, 0x1b}, {&(0x7f0000002480)="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", 0x1000, 0x400}, {&(0x7f0000000180)="6cfd", 0x2, 0x8b0}, {&(0x7f00000001c0)="e9d44d212e9f92dedddba6544767e2c3bf53180dccda45b957ead3eb41314db70802cc6cac02062c4bf4c3c456a1b23d128f6e17eb2347cee56cc7d7d216980cbe7eec912ed66afe5b479abe9bcf58afcb6d1a25b4c24e605952ed77576896936ad080982aea838a44343d9c1167281fcbdc14c8018225ea9b6aaf7252a28f091481b4349d748c37060812fd2fd1e0f0b3f4ea9019a4efd65f15671712fb3e07f7016bc20c306c99f6c18f01ce80f882da69ed75d46a3a469f1840e52c5841e8", 0xc0, 0x3}, {&(0x7f0000000300)="8d939f6d162f753eb348dc0635293be6bad410f27278460627e4a92abc973343cee2f20a65029a5535c80d608f6737058d37674a334c5709d8de24e5db31318b481013b312da55dc", 0x48, 0x1}, {&(0x7f0000003480)="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", 0x1000, 0x3}], 0x20000, &(0x7f0000000280)='eth1\'-\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1033.496958] hid-generic 0000:0000:0000.0156: ignoring exceeding usage max [ 1033.508083] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1033.541043] hid-generic 0000:0000:0000.0156: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:40 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1d00) [ 1033.653404] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:41 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x407) [ 1033.703485] attempt to access beyond end of device [ 1033.708868] loop3: rw=1, want=1333, limit=63 [ 1033.740001] hid-generic 0000:0000:0000.0157: ignoring exceeding usage max [ 1033.850388] hid-generic 0000:0000:0000.0157: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:41 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1e00) [ 1034.115236] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1034.139394] hid-generic 0000:0000:0000.0158: ignoring exceeding usage max [ 1034.152850] hid-generic 0000:0000:0000.0159: ignoring exceeding usage max [ 1034.167273] hid-generic 0000:0000:0000.0158: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1034.204320] hid-generic 0000:0000:0000.0159: hidraw1: HID v0.00 Device [syz1] on %z5 11:33:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) [ 1034.280635] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1034.353973] attempt to access beyond end of device [ 1034.373999] loop3: rw=2049, want=78, limit=63 [ 1034.393729] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 1034.423565] attempt to access beyond end of device [ 1034.435058] loop3: rw=2049, want=79, limit=63 [ 1034.439885] Buffer I/O error on dev loop3, logical block 78, lost async page write [ 1034.448595] attempt to access beyond end of device [ 1034.453898] loop3: rw=2049, want=80, limit=63 [ 1034.458510] Buffer I/O error on dev loop3, logical block 79, lost async page write [ 1034.467207] attempt to access beyond end of device [ 1034.487647] loop3: rw=2049, want=81, limit=63 [ 1034.505653] Buffer I/O error on dev loop3, logical block 80, lost async page write [ 1034.522719] hid-generic 0000:0000:0000.015A: ignoring exceeding usage max [ 1034.543476] attempt to access beyond end of device [ 1034.548810] hid-generic 0000:0000:0000.015A: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1034.566655] loop3: rw=2049, want=114, limit=63 [ 1034.590955] attempt to access beyond end of device [ 1034.602656] loop3: rw=2049, want=115, limit=63 [ 1034.622234] attempt to access beyond end of device [ 1034.648275] loop3: rw=2049, want=116, limit=63 [ 1034.664848] attempt to access beyond end of device [ 1034.677198] loop3: rw=2049, want=117, limit=63 [ 1034.682161] attempt to access beyond end of device [ 1034.687196] loop3: rw=2049, want=130, limit=63 [ 1034.697104] attempt to access beyond end of device [ 1034.715998] loop3: rw=2049, want=131, limit=63 [ 1034.725202] attempt to access beyond end of device [ 1034.743593] loop3: rw=2049, want=132, limit=63 [ 1034.761082] attempt to access beyond end of device [ 1034.776703] loop3: rw=2049, want=133, limit=63 [ 1034.787145] attempt to access beyond end of device [ 1034.803037] loop3: rw=2049, want=157, limit=63 [ 1034.827343] attempt to access beyond end of device [ 1034.839528] loop3: rw=2049, want=5429, limit=63 [ 1034.856596] attempt to access beyond end of device [ 1034.868125] loop3: rw=2049, want=7837, limit=63 [ 1034.879799] attempt to access beyond end of device [ 1034.887330] loop5: rw=2049, want=78, limit=63 [ 1034.901776] attempt to access beyond end of device [ 1034.918047] loop5: rw=2049, want=79, limit=63 [ 1034.938484] attempt to access beyond end of device [ 1034.966907] loop5: rw=2049, want=80, limit=63 [ 1034.982836] attempt to access beyond end of device [ 1035.007289] loop5: rw=2049, want=81, limit=63 [ 1035.029217] attempt to access beyond end of device [ 1035.060258] loop5: rw=2049, want=130, limit=63 [ 1035.082851] attempt to access beyond end of device [ 1035.100834] loop5: rw=2049, want=131, limit=63 [ 1035.117066] attempt to access beyond end of device [ 1035.129041] loop5: rw=2049, want=132, limit=63 [ 1035.145285] attempt to access beyond end of device [ 1035.162058] loop5: rw=2049, want=133, limit=63 [ 1035.167286] attempt to access beyond end of device [ 1035.178026] loop5: rw=2049, want=142, limit=63 [ 1035.192464] attempt to access beyond end of device [ 1035.197436] loop5: rw=2049, want=143, limit=63 [ 1035.203305] attempt to access beyond end of device [ 1035.208263] loop5: rw=2049, want=144, limit=63 [ 1035.214600] attempt to access beyond end of device [ 1035.234020] loop5: rw=2049, want=145, limit=63 [ 1035.257849] attempt to access beyond end of device [ 1035.263180] loop5: rw=2049, want=4241, limit=63 [ 1035.277241] attempt to access beyond end of device [ 1035.282291] loop5: rw=2049, want=8337, limit=63 [ 1035.293728] attempt to access beyond end of device [ 1035.298743] loop5: rw=2049, want=12433, limit=63 11:33:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x5e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:42 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x408) 11:33:42 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1f00) 11:33:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) dup2(0xffffffffffffffff, r3) 11:33:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffffffffffcde) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x121, 0x0, 0x0, 0x6}, 0x0, 0x7, 0xffffffffffffffff, 0x0) lseek(r2, 0x0, 0x3) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) [ 1035.307386] attempt to access beyond end of device [ 1035.312971] loop5: rw=2049, want=12737, limit=63 [ 1035.384243] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:42 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2000) [ 1035.467394] hid-generic 0000:0000:0000.015B: ignoring exceeding usage max [ 1035.486323] hid-generic 0000:0000:0000.015C: ignoring exceeding usage max 11:33:42 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x409) 11:33:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x120e3, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1035.518678] hid-generic 0000:0000:0000.015C: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1035.537254] hid-generic 0000:0000:0000.015B: hidraw1: HID v0.00 Device [syz1] on %z5 11:33:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) dup2(0xffffffffffffffff, r3) 11:33:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) [ 1035.703672] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:43 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2100) [ 1035.860052] hid-generic 0000:0000:0000.015D: ignoring exceeding usage max [ 1035.877967] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1035.891391] hid-generic 0000:0000:0000.015E: ignoring exceeding usage max [ 1035.916150] hid-generic 0000:0000:0000.015D: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1035.929348] hid-generic 0000:0000:0000.015E: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1035.950256] attempt to access beyond end of device [ 1035.956624] loop3: rw=1, want=849, limit=63 [ 1036.575331] attempt to access beyond end of device [ 1036.587069] loop3: rw=2049, want=78, limit=63 [ 1036.598528] attempt to access beyond end of device [ 1036.627907] loop3: rw=2049, want=79, limit=63 [ 1036.638377] attempt to access beyond end of device [ 1036.650927] loop3: rw=2049, want=80, limit=63 [ 1036.661293] attempt to access beyond end of device [ 1036.680556] loop3: rw=2049, want=81, limit=63 [ 1036.685199] attempt to access beyond end of device [ 1036.709836] attempt to access beyond end of device [ 1036.714891] loop3: rw=2049, want=130, limit=63 [ 1036.722494] attempt to access beyond end of device [ 1036.727457] loop3: rw=2049, want=131, limit=63 [ 1036.734354] attempt to access beyond end of device [ 1036.740192] loop5: rw=2049, want=78, limit=63 [ 1036.745755] loop3: rw=2049, want=132, limit=63 [ 1036.774610] attempt to access beyond end of device [ 1036.779624] loop5: rw=2049, want=79, limit=63 [ 1036.790590] attempt to access beyond end of device [ 1036.795573] loop3: rw=2049, want=133, limit=63 [ 1036.800300] attempt to access beyond end of device [ 1036.813993] attempt to access beyond end of device [ 1036.819230] loop5: rw=2049, want=80, limit=63 [ 1036.835790] attempt to access beyond end of device [ 1036.858943] loop3: rw=2049, want=142, limit=63 [ 1036.865539] loop5: rw=2049, want=81, limit=63 [ 1036.866345] attempt to access beyond end of device [ 1036.870119] attempt to access beyond end of device [ 1036.876840] loop3: rw=2049, want=143, limit=63 [ 1036.885773] attempt to access beyond end of device [ 1036.886491] loop5: rw=2049, want=130, limit=63 [ 1036.891169] loop3: rw=2049, want=144, limit=63 [ 1036.897570] attempt to access beyond end of device [ 1036.900128] attempt to access beyond end of device [ 1036.911083] loop3: rw=2049, want=145, limit=63 [ 1036.912212] loop5: rw=2049, want=131, limit=63 [ 1036.915860] attempt to access beyond end of device [ 1036.920302] attempt to access beyond end of device [ 1036.925835] loop3: rw=2049, want=161, limit=63 [ 1036.935436] loop5: rw=2049, want=132, limit=63 [ 1036.940072] attempt to access beyond end of device [ 1036.940076] attempt to access beyond end of device [ 1036.940089] loop5: rw=2049, want=133, limit=63 [ 1036.945468] loop3: rw=2049, want=4945, limit=63 [ 1036.956862] attempt to access beyond end of device [ 1036.966864] attempt to access beyond end of device [ 1036.969331] loop5: rw=2049, want=142, limit=63 [ 1036.972172] loop3: rw=2049, want=9041, limit=63 [ 1036.977324] attempt to access beyond end of device [ 1036.984641] attempt to access beyond end of device [ 1036.991757] loop3: rw=2049, want=9865, limit=63 [ 1036.992151] loop5: rw=2049, want=143, limit=63 [ 1037.005058] attempt to access beyond end of device [ 1037.010032] loop5: rw=2049, want=144, limit=63 [ 1037.017229] attempt to access beyond end of device [ 1037.026200] loop5: rw=2049, want=145, limit=63 [ 1037.035284] attempt to access beyond end of device [ 1037.040344] loop5: rw=2049, want=4241, limit=63 [ 1037.053281] attempt to access beyond end of device 11:33:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x5f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:44 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40a) 11:33:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) dup2(0xffffffffffffffff, r3) 11:33:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) 11:33:44 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2200) 11:33:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1037.058245] loop5: rw=2049, want=8337, limit=63 [ 1037.070670] attempt to access beyond end of device [ 1037.076063] loop5: rw=2049, want=11977, limit=63 [ 1037.195380] hid-generic 0000:0000:0000.015F: ignoring exceeding usage max 11:33:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) [ 1037.245219] hid-generic 0000:0000:0000.015F: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:44 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2300) [ 1037.289699] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) [ 1037.599163] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:44 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40b) [ 1037.680076] hid-generic 0000:0000:0000.0160: ignoring exceeding usage max 11:33:45 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2400) [ 1037.762566] hid-generic 0000:0000:0000.0160: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1037.878951] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1037.992672] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1038.116526] hid-generic 0000:0000:0000.0161: ignoring exceeding usage max [ 1038.147967] hid-generic 0000:0000:0000.0161: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x60) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:45 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40c) 11:33:45 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x26b6) 11:33:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:33:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) eventfd2(0xffff, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc6f, 0x0, @perf_config_ext, 0x400, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) setuid(0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr=0x64010100, 0x4e22, 0xffff, 0x4e21, 0xfffd, 0xa, 0xa0, 0x80, 0xff}, {0xffffffffffffff19, 0x10001, 0x0, 0x6, 0x4, 0x6, 0x8001, 0x80000000}, {0x0, 0x1000, 0xff, 0xffffffffffffff55}, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1}, {{@in6=@private0={0xfc, 0x0, [], 0x1}, 0x4d2, 0x3c}, 0x2, @in6=@private2={0xfc, 0x2, [], 0x1}, 0x3504, 0x0, 0x0, 0x40, 0xfffffffc, 0x0, 0x6}}, 0xe8) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f00000001c0)) dup2(r3, r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e22, @rand_addr=0x64010101}, @in6={0xa, 0x4e21, 0x96df, @loopback, 0x3}, @in6={0xa, 0x4e21, 0xfff, @private2={0xfc, 0x2, [], 0x1}, 0x1f}, @in6={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0xfffffc00, @private1, 0x9}], 0xb0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() socket$inet_tcp(0x2, 0x1, 0x0) [ 1038.749226] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) [ 1038.806763] hid-generic 0000:0000:0000.0162: ignoring exceeding usage max 11:33:46 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x26c8) [ 1038.852018] hid-generic 0000:0000:0000.0162: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1038.906030] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:46 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40d) [ 1039.082391] attempt to access beyond end of device [ 1039.100166] loop3: rw=1, want=661, limit=63 11:33:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, 0xffffffffffffffff) [ 1039.124836] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1039.135446] hid-generic 0000:0000:0000.0163: ignoring exceeding usage max 11:33:46 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2c00) [ 1039.180517] hid-generic 0000:0000:0000.0163: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1039.207680] attempt to access beyond end of device [ 1039.214180] loop3: rw=1, want=78, limit=63 [ 1039.231179] attempt to access beyond end of device [ 1039.235525] loop5: rw=1, want=78, limit=63 [ 1039.267936] buffer_io_error: 44 callbacks suppressed [ 1039.267946] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 1039.268365] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1039.287065] attempt to access beyond end of device [ 1039.299477] hid-generic 0000:0000:0000.0164: ignoring exceeding usage max [ 1039.320180] loop3: rw=1, want=79, limit=63 [ 1039.335291] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1039.349764] Buffer I/O error on dev loop3, logical block 78, lost async page write [ 1039.358530] hid-generic 0000:0000:0000.0164: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1039.374360] attempt to access beyond end of device [ 1039.376153] attempt to access beyond end of device [ 1039.407676] loop5: rw=1, want=79, limit=63 [ 1039.423339] loop3: rw=1, want=80, limit=63 [ 1039.435510] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1039.446968] Buffer I/O error on dev loop3, logical block 79, lost async page write [ 1039.466540] attempt to access beyond end of device [ 1039.476018] attempt to access beyond end of device [ 1039.485399] loop5: rw=1, want=80, limit=63 [ 1039.494022] loop3: rw=1, want=81, limit=63 [ 1039.498444] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1039.500606] Buffer I/O error on dev loop3, logical block 80, lost async page write [ 1039.510128] attempt to access beyond end of device [ 1039.514943] attempt to access beyond end of device [ 1039.523237] loop5: rw=1, want=81, limit=63 [ 1039.525240] loop3: rw=1, want=114, limit=63 [ 1039.529459] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1039.533306] Buffer I/O error on dev loop3, logical block 113, lost async page write [ 1039.555386] attempt to access beyond end of device [ 1039.566262] attempt to access beyond end of device [ 1039.566296] loop5: rw=1, want=114, limit=63 [ 1039.576815] loop3: rw=1, want=115, limit=63 [ 1039.576965] Buffer I/O error on dev loop5, logical block 113, lost async page write [ 1039.584268] attempt to access beyond end of device [ 1039.595406] loop3: rw=1, want=116, limit=63 [ 1039.596977] attempt to access beyond end of device [ 1039.599871] attempt to access beyond end of device [ 1039.608648] loop5: rw=1, want=115, limit=63 [ 1039.615712] attempt to access beyond end of device [ 1039.617610] loop3: rw=1, want=117, limit=63 [ 1039.621736] loop5: rw=1, want=116, limit=63 [ 1039.628166] attempt to access beyond end of device [ 1039.629576] attempt to access beyond end of device [ 1039.637133] loop3: rw=1, want=130, limit=63 [ 1039.641364] loop5: rw=1, want=117, limit=63 [ 1039.646481] attempt to access beyond end of device [ 1039.649189] attempt to access beyond end of device [ 1039.656852] loop3: rw=1, want=131, limit=63 [ 1039.659196] loop5: rw=1, want=130, limit=63 [ 1039.665275] attempt to access beyond end of device [ 1039.668222] attempt to access beyond end of device [ 1039.677568] loop5: rw=1, want=131, limit=63 [ 1039.682664] attempt to access beyond end of device [ 1039.687726] loop5: rw=1, want=132, limit=63 [ 1039.693252] attempt to access beyond end of device [ 1039.695533] loop3: rw=1, want=132, limit=63 [ 1039.698332] loop5: rw=1, want=133, limit=63 [ 1039.710015] attempt to access beyond end of device [ 1039.716088] loop5: rw=1, want=989, limit=63 [ 1039.731171] attempt to access beyond end of device [ 1039.757797] loop3: rw=1, want=133, limit=63 [ 1039.777724] attempt to access beyond end of device [ 1039.788432] loop3: rw=1, want=157, limit=63 [ 1039.815513] attempt to access beyond end of device [ 1039.826299] loop3: rw=1, want=1509, limit=63 [ 1039.830759] attempt to access beyond end of device [ 1039.830772] loop5: rw=1, want=2365, limit=63 [ 1039.852874] attempt to access beyond end of device [ 1039.882652] loop3: rw=2049, want=1773, limit=63 [ 1039.896404] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1039.909055] attempt to access beyond end of device [ 1039.910825] FAT-fs (loop3): Filesystem has been set read-only [ 1039.915264] loop5: rw=2049, want=3429, limit=63 11:33:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x61) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:47 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40e) 11:33:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, 0xffffffffffffffff) 11:33:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:33:47 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3600) [ 1039.932155] attempt to access beyond end of device [ 1039.938028] loop5: rw=2049, want=3437, limit=63 11:33:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000040)={0x3, 0x1, 0x0, 'queue1\x00', 0x7fffffff}) socket$inet_tcp(0x2, 0x1, 0x0) [ 1040.029390] hid-generic 0000:0000:0000.0165: ignoring exceeding usage max [ 1040.055258] hid-generic 0000:0000:0000.0165: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:47 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3f00) [ 1040.117116] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, 0xffffffffffffffff) [ 1040.325818] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1040.382950] attempt to access beyond end of device [ 1040.389743] hid-generic 0000:0000:0000.0166: ignoring exceeding usage max [ 1040.399285] loop3: rw=1, want=3089, limit=63 [ 1040.421954] hid-generic 0000:0000:0000.0166: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:47 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40f) [ 1040.544701] hid-generic 0000:0000:0000.0167: ignoring exceeding usage max 11:33:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:47 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4000) [ 1040.645140] hid-generic 0000:0000:0000.0167: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1040.648816] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1040.955512] hid-generic 0000:0000:0000.0168: ignoring exceeding usage max [ 1040.989868] hid-generic 0000:0000:0000.0168: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x62) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:48 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x500) 11:33:48 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40dc) 11:33:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x7f, 0x86640, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000, 0x3, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1041.335918] hid-generic 0000:0000:0000.0169: ignoring exceeding usage max [ 1041.359962] hid-generic 0000:0000:0000.0169: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1041.400291] hid-generic 0000:0000:0000.016A: ignoring exceeding usage max [ 1041.431873] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:48 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6000) [ 1041.476622] hid-generic 0000:0000:0000.016A: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) [ 1041.534341] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:48 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x504) [ 1041.672556] hid-generic 0000:0000:0000.016B: ignoring exceeding usage max [ 1041.695137] hid-generic 0000:0000:0000.016B: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:49 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6d00) [ 1041.895094] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1041.904169] hid-generic 0000:0000:0000.016C: ignoring exceeding usage max [ 1041.928117] hid-generic 0000:0000:0000.016C: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1042.007823] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1042.081121] hid-generic 0000:0000:0000.016D: ignoring exceeding usage max [ 1042.127813] hid-generic 0000:0000:0000.016D: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x63) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r1, r2, 0x7, 0xcf, &(0x7f0000000180)="2bca538faf187ecc7d964da350ac4840ee680fb6ff4e2fcd0a80168a39f29f12fc302ccaaa7ced0a4e828752c49e6ccd77018425870a8824b78b57a3535b65f19e6a32aa88a00a5c0a525eca0cdbe55493ce63f2654d3119253af866d7d7d56bd4a28bff7dd506897e8563d325d01b8c9fcd7eb1313b11060e0b278442520c44f64f741658e238533f0a50c868caf9400c2817c346c571ce608871fbefce95839686213243132fe0532b28f70d42ec180e9ff2344a3cc4fc8ed7c1f74a4a7f659bc6ceb72e7f1b6b59df7d3f3ef0e6", 0x0, 0x20, 0x800, 0x4b78, 0x3, 0x3, 0x6, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) 11:33:49 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x600) 11:33:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:49 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6e00) 11:33:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) r2 = inotify_init1(0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000800)='/dev/hwrng\x00', 0x80, 0x0) dup2(r2, r3) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) epoll_pwait(r4, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0xffffff0e, &(0x7f0000000180)={[0xfff]}, 0x8) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1042.639505] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1042.733619] hid-generic 0000:0000:0000.016E: ignoring exceeding usage max [ 1042.738534] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1042.773557] hid-generic 0000:0000:0000.016F: ignoring exceeding usage max 11:33:50 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7e00) 11:33:50 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x604) [ 1042.814047] hid-generic 0000:0000:0000.016E: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1042.827507] hid-generic 0000:0000:0000.016F: hidraw1: HID v0.00 Device [syz1] on %z5 11:33:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) [ 1043.012651] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1043.136567] hid-generic 0000:0000:0000.0170: ignoring exceeding usage max [ 1043.177552] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1043.187700] hid-generic 0000:0000:0000.0170: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:50 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x700) 11:33:50 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7f00) [ 1043.289750] hid-generic 0000:0000:0000.0171: ignoring exceeding usage max [ 1043.347793] hid-generic 0000:0000:0000.0171: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1043.402263] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1043.497268] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1044.052103] attempt to access beyond end of device [ 1044.057080] loop5: rw=2049, want=78, limit=63 [ 1044.068690] attempt to access beyond end of device [ 1044.075847] loop5: rw=2049, want=79, limit=63 [ 1044.084257] attempt to access beyond end of device [ 1044.089492] loop5: rw=2049, want=80, limit=63 [ 1044.098079] attempt to access beyond end of device [ 1044.115532] loop5: rw=2049, want=81, limit=63 [ 1044.124450] attempt to access beyond end of device [ 1044.132072] loop5: rw=2049, want=114, limit=63 [ 1044.137253] attempt to access beyond end of device [ 1044.146272] loop5: rw=2049, want=115, limit=63 [ 1044.152777] attempt to access beyond end of device [ 1044.157823] loop5: rw=2049, want=116, limit=63 [ 1044.166115] attempt to access beyond end of device [ 1044.172864] loop5: rw=2049, want=117, limit=63 [ 1044.177609] attempt to access beyond end of device [ 1044.190327] loop5: rw=2049, want=130, limit=63 [ 1044.195207] attempt to access beyond end of device [ 1044.202217] loop5: rw=2049, want=131, limit=63 [ 1044.206947] attempt to access beyond end of device [ 1044.213873] loop5: rw=2049, want=132, limit=63 [ 1044.219407] attempt to access beyond end of device [ 1044.226909] loop5: rw=2049, want=133, limit=63 [ 1044.242124] attempt to access beyond end of device 11:33:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x64) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:51 executing program 4: ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) 11:33:51 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x704) 11:33:51 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xb626) 11:33:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) readlink(&(0x7f0000000200)='./bus\x00', &(0x7f0000000580)=""/189, 0xbd) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_passwd_agent_exec_t:s0\x00', 0x31, 0x3) socket$inet_tcp(0x2, 0x1, 0x0) [ 1044.252671] loop5: rw=2049, want=4237, limit=63 [ 1044.266117] attempt to access beyond end of device [ 1044.271241] loop5: rw=2049, want=8333, limit=63 [ 1044.281412] attempt to access beyond end of device [ 1044.286441] loop5: rw=2049, want=9621, limit=63 [ 1044.365969] hid-generic 0000:0000:0000.0172: ignoring exceeding usage max [ 1044.384058] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1044.433032] hid-generic 0000:0000:0000.0172: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:51 executing program 4: ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1044.474435] hid-generic 0000:0000:0000.0173: ignoring exceeding usage max [ 1044.523906] hid-generic 0000:0000:0000.0174: ignoring exceeding usage max [ 1044.546430] hid-generic 0000:0000:0000.0173: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1044.570570] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1044.578067] hid-generic 0000:0000:0000.0174: hidraw1: HID v0.00 Device [syz1] on %z5 11:33:51 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xc826) [ 1044.637793] attempt to access beyond end of device 11:33:51 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x804) 11:33:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1044.663300] hid-generic 0000:0000:0000.0175: ignoring exceeding usage max [ 1044.665857] loop3: rw=1, want=1057, limit=63 [ 1044.724736] hid-generic 0000:0000:0000.0175: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:52 executing program 4: ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:52 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xdc40) [ 1044.889685] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1044.927666] hid-generic 0000:0000:0000.0176: ignoring exceeding usage max [ 1044.982160] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1044.996410] hid-generic 0000:0000:0000.0176: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1045.217054] hid-generic 0000:0000:0000.0177: ignoring exceeding usage max [ 1045.247722] hid-generic 0000:0000:0000.0177: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:33:53 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x900) 11:33:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x65) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:53 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xedc0) 11:33:53 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r4 = dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x10}, 0x0, 0xffffffffffffffff, r3, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) setfsgid(r6) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x1}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2}, {}, {0x2, 0x7}], {0x4, 0xd}, [{0x8, 0x2}, {}, {0x8, 0x6}, {0x8, 0x5, 0xffffffffffffffff}, {0x8, 0x4, r6}], {}, {0x20, 0x3}}, 0x84, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) [ 1046.031700] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1046.061728] hid-generic 0000:0000:0000.0178: ignoring exceeding usage max 11:33:53 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xf703) 11:33:53 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1046.151821] hid-generic 0000:0000:0000.0179: ignoring exceeding usage max [ 1046.165096] hid-generic 0000:0000:0000.0179: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1046.176793] hid-generic 0000:0000:0000.0178: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:53 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x904) 11:33:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1046.225770] attempt to access beyond end of device [ 1046.241065] loop3: rw=1, want=641, limit=64 [ 1046.356147] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1046.401832] hid-generic 0000:0000:0000.017A: ignoring exceeding usage max [ 1046.438993] hid-generic 0000:0000:0000.017A: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:53 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1046.538449] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1046.552152] hid-generic 0000:0000:0000.017B: ignoring exceeding usage max 11:33:53 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xa04) 11:33:53 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xff0f) [ 1046.586643] hid-generic 0000:0000:0000.017B: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1046.751279] hid-generic 0000:0000:0000.017C: ignoring exceeding usage max [ 1046.785076] hid-generic 0000:0000:0000.017C: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1046.833171] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1046.962565] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1046.967521] hid-generic 0000:0000:0000.017D: ignoring exceeding usage max [ 1047.019519] hid-generic 0000:0000:0000.017D: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1047.202561] attempt to access beyond end of device [ 1047.207629] loop5: rw=2049, want=78, limit=63 [ 1047.213239] buffer_io_error: 26 callbacks suppressed [ 1047.213250] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1047.228140] attempt to access beyond end of device [ 1047.233961] loop5: rw=2049, want=79, limit=63 [ 1047.238473] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1047.247545] attempt to access beyond end of device [ 1047.264721] loop5: rw=2049, want=80, limit=63 [ 1047.269268] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1047.278261] attempt to access beyond end of device [ 1047.284177] loop5: rw=2049, want=81, limit=63 [ 1047.288697] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1047.297554] attempt to access beyond end of device [ 1047.303999] loop5: rw=2049, want=130, limit=63 [ 1047.308607] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 1047.317988] attempt to access beyond end of device [ 1047.323662] loop5: rw=2049, want=131, limit=63 [ 1047.328269] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 1047.337255] attempt to access beyond end of device [ 1047.343102] loop5: rw=2049, want=132, limit=63 [ 1047.347740] Buffer I/O error on dev loop5, logical block 131, lost async page write [ 1047.356789] attempt to access beyond end of device [ 1047.362574] loop5: rw=2049, want=133, limit=63 [ 1047.374110] Buffer I/O error on dev loop5, logical block 132, lost async page write [ 1047.385418] attempt to access beyond end of device [ 1047.390965] loop5: rw=2049, want=142, limit=63 [ 1047.395606] Buffer I/O error on dev loop5, logical block 141, lost async page write [ 1047.404821] attempt to access beyond end of device [ 1047.411109] loop5: rw=2049, want=143, limit=63 [ 1047.416005] Buffer I/O error on dev loop5, logical block 142, lost async page write [ 1047.466640] attempt to access beyond end of device [ 1047.473150] loop5: rw=2049, want=144, limit=63 [ 1047.482345] attempt to access beyond end of device [ 1047.501416] loop5: rw=2049, want=145, limit=63 [ 1047.553677] attempt to access beyond end of device [ 1047.574041] loop5: rw=2049, want=4241, limit=63 11:33:54 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x20000) 11:33:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x66) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:54 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:54 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xb04) 11:33:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000140)={0x1, 0x0, {0x3f, 0x7, 0x6, 0xfffffffb}}) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r1) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, 0x3, 0x1, 0x91, &(0x7f0000c00000/0x400000)=nil, 0x400000}) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(0xffffffffffffffff, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x310f, 0x851a9218c98eba22, @perf_config_ext={0x1d, 0x9}, 0x0, 0x0, 0x0, 0x8, 0x10001, 0x38c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1047.597055] attempt to access beyond end of device [ 1047.610434] loop5: rw=2049, want=8337, limit=63 [ 1047.621119] attempt to access beyond end of device [ 1047.626368] loop5: rw=2049, want=10609, limit=63 [ 1047.748880] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1047.783972] hid-generic 0000:0000:0000.017E: ignoring exceeding usage max [ 1047.831811] hid-generic 0000:0000:0000.017F: ignoring exceeding usage max [ 1047.839870] hid-generic 0000:0000:0000.017E: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:55 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xc04) 11:33:55 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40000) 11:33:55 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1047.902635] hid-generic 0000:0000:0000.017F: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1047.935302] hid-generic 0000:0000:0000.0180: ignoring exceeding usage max 11:33:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1047.991790] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1048.008975] hid-generic 0000:0000:0000.0180: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0xc1) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1048.109055] hid-generic 0000:0000:0000.0181: ignoring exceeding usage max [ 1048.123298] hid-generic 0000:0000:0000.0181: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:55 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1048.236382] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1048.270269] hid-generic 0000:0000:0000.0182: ignoring exceeding usage max [ 1048.290670] hid-generic 0000:0000:0000.0182: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:55 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xd00) [ 1048.434250] attempt to access beyond end of device [ 1048.443603] loop3: rw=1, want=537, limit=63 [ 1048.501865] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1048.548942] hid-generic 0000:0000:0000.0183: ignoring exceeding usage max [ 1048.578162] hid-generic 0000:0000:0000.0183: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1048.605065] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1049.078054] attempt to access beyond end of device [ 1049.088681] loop3: rw=2049, want=78, limit=63 [ 1049.095291] attempt to access beyond end of device [ 1049.112240] loop3: rw=2049, want=79, limit=63 [ 1049.117531] attempt to access beyond end of device [ 1049.128075] loop3: rw=2049, want=80, limit=63 [ 1049.137259] attempt to access beyond end of device [ 1049.149605] loop3: rw=2049, want=81, limit=63 [ 1049.155576] attempt to access beyond end of device [ 1049.168294] loop3: rw=2049, want=130, limit=63 11:33:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x67) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:56 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xe0000) 11:33:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:33:56 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:56 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xd04) [ 1049.182062] attempt to access beyond end of device [ 1049.187292] loop3: rw=2049, want=131, limit=63 [ 1049.194199] attempt to access beyond end of device [ 1049.204364] loop3: rw=2049, want=132, limit=63 [ 1049.218081] attempt to access beyond end of device [ 1049.244170] loop3: rw=2049, want=133, limit=63 [ 1049.263295] attempt to access beyond end of device [ 1049.286252] loop3: rw=2049, want=142, limit=63 [ 1049.298539] attempt to access beyond end of device [ 1049.325751] loop3: rw=2049, want=143, limit=63 [ 1049.337662] attempt to access beyond end of device [ 1049.354514] loop3: rw=2049, want=144, limit=63 [ 1049.373922] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1049.396809] attempt to access beyond end of device [ 1049.407538] hid-generic 0000:0000:0000.0184: ignoring exceeding usage max [ 1049.422746] hid-generic 0000:0000:0000.0185: ignoring exceeding usage max 11:33:56 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xe00) [ 1049.467409] loop3: rw=2049, want=145, limit=63 [ 1049.474158] hid-generic 0000:0000:0000.0185: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1049.478069] attempt to access beyond end of device [ 1049.492943] hid-generic 0000:0000:0000.0184: hidraw1: HID v0.00 Device [syz1] on %z5 11:33:56 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x100000) 11:33:56 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1049.557227] loop3: rw=2049, want=161, limit=63 11:33:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1049.593858] attempt to access beyond end of device [ 1049.608521] loop3: rw=2049, want=4633, limit=63 [ 1049.651561] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1049.668741] attempt to access beyond end of device [ 1049.692829] loop3: rw=2049, want=8729, limit=63 11:33:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) lseek(r3, 0x200, 0x2) [ 1049.725467] attempt to access beyond end of device [ 1049.731087] loop3: rw=2049, want=12825, limit=63 [ 1049.740871] attempt to access beyond end of device [ 1049.745819] loop3: rw=2049, want=15913, limit=63 [ 1049.796290] hid-generic 0000:0000:0000.0186: ignoring exceeding usage max [ 1049.819863] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1049.844708] hid-generic 0000:0000:0000.0186: hidraw0: HID v0.00 Device [syz1] on %z5 11:33:57 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1fffff) [ 1050.113173] hid-generic 0000:0000:0000.0187: ignoring exceeding usage max [ 1050.150068] hid-generic 0000:0000:0000.0187: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1050.571694] attempt to access beyond end of device [ 1050.576829] loop3: rw=1, want=609, limit=63 [ 1050.588887] attempt to access beyond end of device [ 1050.605930] loop5: rw=2049, want=78, limit=63 [ 1050.617490] hid-generic 0000:0000:0000.0188: ignoring exceeding usage max [ 1050.624991] attempt to access beyond end of device [ 1050.659351] hid-generic 0000:0000:0000.0188: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1050.665720] loop5: rw=2049, want=79, limit=63 [ 1050.678876] attempt to access beyond end of device [ 1050.705369] loop5: rw=2049, want=80, limit=63 [ 1050.718089] attempt to access beyond end of device [ 1050.761944] loop5: rw=2049, want=81, limit=63 [ 1050.769552] attempt to access beyond end of device [ 1050.774635] loop5: rw=2049, want=130, limit=63 [ 1050.780303] attempt to access beyond end of device [ 1050.785385] loop5: rw=2049, want=131, limit=63 [ 1050.791615] attempt to access beyond end of device [ 1050.797810] loop5: rw=2049, want=132, limit=63 [ 1050.803001] attempt to access beyond end of device [ 1050.808070] loop5: rw=2049, want=133, limit=63 [ 1050.813162] attempt to access beyond end of device [ 1050.818240] loop5: rw=2049, want=142, limit=63 [ 1050.823616] attempt to access beyond end of device [ 1050.829516] loop5: rw=2049, want=143, limit=63 [ 1050.834292] attempt to access beyond end of device [ 1050.839917] loop5: rw=2049, want=144, limit=63 [ 1050.844673] attempt to access beyond end of device [ 1050.850026] loop5: rw=2049, want=145, limit=63 11:33:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x68) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:33:58 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:58 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xe04) 11:33:58 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x200000) 11:33:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1050.860528] attempt to access beyond end of device [ 1050.865596] loop5: rw=2049, want=4241, limit=63 [ 1050.878545] attempt to access beyond end of device [ 1050.883965] loop5: rw=2049, want=8337, limit=63 [ 1050.894392] attempt to access beyond end of device [ 1050.899599] loop5: rw=2049, want=10369, limit=63 11:33:58 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x400000) [ 1051.065492] hid-generic 0000:0000:0000.0189: ignoring exceeding usage max [ 1051.098317] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1051.106272] hid-generic 0000:0000:0000.018A: ignoring exceeding usage max [ 1051.163109] hid-generic 0000:0000:0000.0189: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1051.191730] hid-generic 0000:0000:0000.018A: hidraw2: HID v0.00 Device [syz1] on %z5 11:33:58 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1051.248058] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1051.273621] hid-generic 0000:0000:0000.018B: ignoring exceeding usage max 11:33:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) fchdir(0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:33:58 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xf00) [ 1051.313481] hid-generic 0000:0000:0000.018B: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1051.486104] hid-generic 0000:0000:0000.018C: ignoring exceeding usage max [ 1051.524539] hid-generic 0000:0000:0000.018C: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1051.564839] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1051.666032] hid-generic 0000:0000:0000.018D: ignoring exceeding usage max [ 1051.674977] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:33:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:33:59 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x600000) 11:33:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1051.725221] hid-generic 0000:0000:0000.018D: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1051.970026] hid-generic 0000:0000:0000.018E: ignoring exceeding usage max [ 1052.013563] hid-generic 0000:0000:0000.018E: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1052.387166] attempt to access beyond end of device [ 1052.405890] loop5: rw=2049, want=78, limit=63 [ 1052.425307] buffer_io_error: 26 callbacks suppressed [ 1052.425319] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1052.467635] attempt to access beyond end of device [ 1052.492366] loop5: rw=2049, want=79, limit=63 [ 1052.502017] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1052.524339] attempt to access beyond end of device [ 1052.531038] loop5: rw=2049, want=80, limit=63 [ 1052.553073] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1052.575360] attempt to access beyond end of device [ 1052.592639] loop5: rw=2049, want=81, limit=63 [ 1052.606153] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1052.632868] attempt to access beyond end of device [ 1052.647399] loop5: rw=2049, want=114, limit=63 [ 1052.664526] Buffer I/O error on dev loop5, logical block 113, lost async page write [ 1052.731524] attempt to access beyond end of device [ 1052.736527] loop5: rw=2049, want=115, limit=63 [ 1052.770076] Buffer I/O error on dev loop5, logical block 114, lost async page write [ 1052.778062] attempt to access beyond end of device [ 1052.783624] loop5: rw=2049, want=116, limit=63 [ 1052.788324] Buffer I/O error on dev loop5, logical block 115, lost async page write [ 1052.802858] attempt to access beyond end of device [ 1052.820433] loop5: rw=2049, want=117, limit=63 [ 1052.825116] Buffer I/O error on dev loop5, logical block 116, lost async page write [ 1052.837500] attempt to access beyond end of device [ 1052.847406] loop5: rw=2049, want=130, limit=63 [ 1052.853317] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 1052.861822] attempt to access beyond end of device [ 1052.869221] loop5: rw=2049, want=131, limit=63 [ 1052.877269] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 1052.907202] attempt to access beyond end of device [ 1052.915215] loop5: rw=2049, want=132, limit=63 [ 1052.939387] attempt to access beyond end of device [ 1052.944433] loop5: rw=2049, want=133, limit=63 [ 1052.955505] attempt to access beyond end of device [ 1052.973468] loop5: rw=2049, want=4237, limit=63 [ 1053.017721] attempt to access beyond end of device [ 1053.048380] loop5: rw=2049, want=8333, limit=63 11:34:00 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xf04) 11:34:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) fchdir(0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x69) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:00 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6b6b6b) 11:34:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:00 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$reject(0x13, r0, 0x400, 0x0, r1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r3, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1053.068340] attempt to access beyond end of device [ 1053.086709] loop5: rw=2049, want=12429, limit=63 [ 1053.094698] attempt to access beyond end of device [ 1053.100935] loop5: rw=2049, want=13965, limit=63 11:34:00 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x80ffff) [ 1053.249845] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1053.286587] hid-generic 0000:0000:0000.018F: ignoring exceeding usage max [ 1053.295421] hid-generic 0000:0000:0000.0190: ignoring exceeding usage max [ 1053.379303] hid-generic 0000:0000:0000.018F: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1053.383125] hid-generic 0000:0000:0000.0190: hidraw1: HID v0.00 Device [syz1] on %z5 11:34:00 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2000) 11:34:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) fchdir(0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:00 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xa0ffff) [ 1053.678573] hid-generic 0000:0000:0000.0191: ignoring exceeding usage max [ 1053.727427] hid-generic 0000:0000:0000.0191: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1053.759473] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1053.782186] hid-generic 0000:0000:0000.0192: ignoring exceeding usage max [ 1053.836919] hid-generic 0000:0000:0000.0192: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:01 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xc0ffff) [ 1053.980422] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1053.983757] hid-generic 0000:0000:0000.0193: ignoring exceeding usage max [ 1054.038339] hid-generic 0000:0000:0000.0193: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1054.199145] hid-generic 0000:0000:0000.0194: ignoring exceeding usage max [ 1054.240446] hid-generic 0000:0000:0000.0194: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1054.670703] attempt to access beyond end of device [ 1054.675678] loop5: rw=2049, want=78, limit=63 [ 1054.688833] attempt to access beyond end of device [ 1054.693801] loop5: rw=2049, want=79, limit=63 [ 1054.699826] attempt to access beyond end of device [ 1054.704779] loop5: rw=2049, want=80, limit=63 [ 1054.709814] attempt to access beyond end of device [ 1054.714889] loop5: rw=2049, want=81, limit=63 [ 1054.722922] attempt to access beyond end of device [ 1054.727913] loop5: rw=2049, want=130, limit=63 [ 1054.732963] attempt to access beyond end of device [ 1054.737921] loop5: rw=2049, want=131, limit=63 [ 1054.743045] attempt to access beyond end of device [ 1054.748000] loop5: rw=2049, want=132, limit=63 [ 1054.753013] attempt to access beyond end of device [ 1054.757987] loop5: rw=2049, want=133, limit=63 [ 1054.763438] attempt to access beyond end of device [ 1054.768392] loop5: rw=2049, want=142, limit=63 [ 1054.773487] attempt to access beyond end of device [ 1054.778441] loop5: rw=2049, want=143, limit=63 [ 1054.783544] attempt to access beyond end of device [ 1054.789411] loop5: rw=2049, want=144, limit=63 [ 1054.794093] attempt to access beyond end of device [ 1054.799573] loop5: rw=2049, want=145, limit=63 [ 1054.809721] attempt to access beyond end of device [ 1054.814688] loop5: rw=2049, want=4241, limit=63 [ 1054.826731] attempt to access beyond end of device [ 1054.832145] loop5: rw=2049, want=8337, limit=63 [ 1054.849590] attempt to access beyond end of device [ 1054.854564] loop5: rw=2049, want=12433, limit=63 [ 1054.871919] attempt to access beyond end of device 11:34:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x6a) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:02 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2200) 11:34:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:02 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1000000) [ 1054.877057] loop5: rw=2049, want=16529, limit=63 [ 1054.894217] attempt to access beyond end of device [ 1054.900262] loop5: rw=2049, want=20625, limit=63 [ 1054.910614] attempt to access beyond end of device [ 1054.915889] loop5: rw=2049, want=23289, limit=63 11:34:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="ef990be427bf9b2ee0e30bddddfea26e697aab7bc1756d9f912d9d03f9c1f7b6e6a32b99f14e8f93151d94e85f7845a69d", 0x31, 0x4000000, &(0x7f0000000400)={0xa, 0x4e22, 0x3, @private1={0xfc, 0x1, [], 0x1}}, 0x1c) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={r4, 0x5, 0x10, 0x7, 0x1ff}, &(0x7f00000001c0)=0x18) dup2(r3, r2) write$binfmt_elf32(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1047], 0x417) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 11:34:02 executing program 2: r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1055.060715] hid-generic 0000:0000:0000.0195: ignoring exceeding usage max [ 1055.116848] hid-generic 0000:0000:0000.0196: ignoring exceeding usage max [ 1055.125743] hid-generic 0000:0000:0000.0195: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1055.152747] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:02 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1040000) [ 1055.178378] hid-generic 0000:0000:0000.0196: hidraw1: HID v0.00 Device [syz1] on %z5 11:34:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:02 executing program 2: r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:02 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2300) [ 1055.292855] hid-generic 0000:0000:0000.0197: ignoring exceeding usage max [ 1055.358048] hid-generic 0000:0000:0000.0197: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1055.444213] hid-generic 0000:0000:0000.0198: ignoring exceeding usage max [ 1055.488106] hid-generic 0000:0000:0000.0199: ignoring exceeding usage max [ 1055.512313] hid-generic 0000:0000:0000.0198: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1055.533072] hid-generic 0000:0000:0000.0199: hidraw2: HID v0.00 Device [syz1] on %z5 11:34:02 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2000000) 11:34:02 executing program 2: r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1055.562319] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1055.676496] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1055.724599] hid-generic 0000:0000:0000.019A: ignoring exceeding usage max [ 1055.763977] hid-generic 0000:0000:0000.019A: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1055.893283] hid-generic 0000:0000:0000.019B: ignoring exceeding usage max [ 1055.918198] hid-generic 0000:0000:0000.019B: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1056.745617] attempt to access beyond end of device [ 1056.756346] loop5: rw=2049, want=78, limit=63 [ 1056.761845] attempt to access beyond end of device [ 1056.766897] loop5: rw=2049, want=79, limit=63 [ 1056.772789] attempt to access beyond end of device [ 1056.777732] loop5: rw=2049, want=80, limit=63 [ 1056.782952] attempt to access beyond end of device [ 1056.788153] loop5: rw=2049, want=81, limit=63 [ 1056.793813] attempt to access beyond end of device [ 1056.799292] loop5: rw=2049, want=130, limit=63 [ 1056.804320] attempt to access beyond end of device [ 1056.810354] loop5: rw=2049, want=131, limit=63 [ 1056.815109] attempt to access beyond end of device [ 1056.820951] loop5: rw=2049, want=132, limit=63 [ 1056.825728] attempt to access beyond end of device [ 1056.832816] loop5: rw=2049, want=133, limit=63 [ 1056.837447] attempt to access beyond end of device [ 1056.843148] loop5: rw=2049, want=142, limit=63 [ 1056.847764] attempt to access beyond end of device [ 1056.853753] loop5: rw=2049, want=143, limit=63 [ 1056.858906] attempt to access beyond end of device [ 1056.863853] loop5: rw=2049, want=144, limit=63 [ 1056.869643] attempt to access beyond end of device [ 1056.874667] loop5: rw=2049, want=145, limit=63 [ 1056.883080] attempt to access beyond end of device [ 1056.888084] loop5: rw=2049, want=4241, limit=63 [ 1056.897987] attempt to access beyond end of device [ 1056.903042] loop5: rw=2049, want=8337, limit=63 [ 1056.914310] attempt to access beyond end of device [ 1056.919386] loop5: rw=2049, want=12433, limit=63 [ 1056.928024] attempt to access beyond end of device [ 1056.933056] loop5: rw=2049, want=16529, limit=63 11:34:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x6b) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:04 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:04 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x26bc) 11:34:04 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2040000) 11:34:04 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r2, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3c9}]}]}, 0x24}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xd8, r2, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x63f9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40f}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5092443}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x81}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40080}, 0x4008054) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r4, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1056.944529] attempt to access beyond end of device [ 1056.949558] loop5: rw=2049, want=20625, limit=63 [ 1056.958041] attempt to access beyond end of device [ 1056.963045] loop5: rw=2049, want=24721, limit=63 [ 1056.974018] attempt to access beyond end of device [ 1056.979435] loop5: rw=2049, want=28465, limit=63 [ 1057.061934] hid-generic 0000:0000:0000.019C: ignoring exceeding usage max [ 1057.115071] hid-generic 0000:0000:0000.019C: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1057.142491] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1057.154564] hid-generic 0000:0000:0000.019D: ignoring exceeding usage max 11:34:04 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3000000) [ 1057.176082] hid-generic 0000:0000:0000.019D: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:04 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x26cc) 11:34:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:04 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1057.308250] attempt to access beyond end of device [ 1057.313695] loop3: rw=1, want=261, limit=63 11:34:04 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3040000) [ 1057.511802] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1057.514375] hid-generic 0000:0000:0000.019E: ignoring exceeding usage max [ 1057.582533] hid-generic 0000:0000:0000.019F: ignoring exceeding usage max [ 1057.590722] hid-generic 0000:0000:0000.019E: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1057.634813] hid-generic 0000:0000:0000.019F: hidraw1: HID v0.00 Device [syz1] on %z5 11:34:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1057.682053] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1057.861783] hid-generic 0000:0000:0000.01A0: ignoring exceeding usage max [ 1057.884236] hid-generic 0000:0000:0000.01A0: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1057.908196] hid-generic 0000:0000:0000.01A1: ignoring exceeding usage max [ 1057.929364] hid-generic 0000:0000:0000.01A1: hidraw1: HID v0.00 Device [syz1] on %z5 [ 1058.908449] attempt to access beyond end of device [ 1058.913423] loop5: rw=2049, want=78, limit=63 [ 1058.917933] buffer_io_error: 26 callbacks suppressed [ 1058.917943] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1058.933090] attempt to access beyond end of device [ 1058.938052] loop5: rw=2049, want=79, limit=63 [ 1058.943221] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1058.951759] attempt to access beyond end of device [ 1058.956704] loop5: rw=2049, want=80, limit=63 [ 1058.961850] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1058.969665] attempt to access beyond end of device [ 1058.974598] loop5: rw=2049, want=81, limit=63 [ 1058.979475] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1058.987271] attempt to access beyond end of device [ 1058.992311] loop5: rw=2049, want=130, limit=63 [ 1058.997530] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 1059.005497] attempt to access beyond end of device [ 1059.010659] loop5: rw=2049, want=131, limit=63 [ 1059.015428] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 1059.023393] attempt to access beyond end of device [ 1059.028445] loop5: rw=2049, want=132, limit=63 [ 1059.033205] Buffer I/O error on dev loop5, logical block 131, lost async page write [ 1059.041161] attempt to access beyond end of device [ 1059.046088] loop5: rw=2049, want=133, limit=63 [ 1059.050724] Buffer I/O error on dev loop5, logical block 132, lost async page write [ 1059.058811] attempt to access beyond end of device [ 1059.063754] loop5: rw=2049, want=142, limit=63 [ 1059.068432] Buffer I/O error on dev loop5, logical block 141, lost async page write [ 1059.076252] attempt to access beyond end of device [ 1059.081363] loop5: rw=2049, want=143, limit=63 [ 1059.085945] Buffer I/O error on dev loop5, logical block 142, lost async page write [ 1059.093836] attempt to access beyond end of device [ 1059.098878] loop5: rw=2049, want=144, limit=63 [ 1059.103490] attempt to access beyond end of device [ 1059.108583] loop5: rw=2049, want=145, limit=63 [ 1059.116260] attempt to access beyond end of device [ 1059.121367] loop5: rw=2049, want=4241, limit=63 [ 1059.131570] attempt to access beyond end of device [ 1059.136511] loop5: rw=2049, want=8337, limit=63 [ 1059.146009] attempt to access beyond end of device [ 1059.151046] loop5: rw=2049, want=12433, limit=63 [ 1059.161145] attempt to access beyond end of device [ 1059.166081] loop5: rw=2049, want=16529, limit=63 [ 1059.175412] attempt to access beyond end of device [ 1059.180476] loop5: rw=2049, want=20625, limit=63 [ 1059.189848] attempt to access beyond end of device [ 1059.194797] loop5: rw=2049, want=24721, limit=63 [ 1059.204014] attempt to access beyond end of device 11:34:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x6c) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:06 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:06 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x2c00) 11:34:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:06 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4000000) 11:34:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e22, 0x3ff, @loopback, 0x6}, @in6={0xa, 0x4e22, 0x4, @private2, 0x21a}, @in6={0xa, 0x4e21, 0x3, @private0, 0x45}, @in={0x2, 0x4e20, @multicast2}], 0x74) openat$cgroup_ro(r3, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r1, &(0x7f0000000200)={0x1d}) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x6) [ 1059.209093] loop5: rw=2049, want=28817, limit=63 [ 1059.217625] attempt to access beyond end of device [ 1059.222703] loop5: rw=2049, want=32881, limit=63 [ 1059.308230] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1059.389540] hid-generic 0000:0000:0000.01A2: ignoring exceeding usage max 11:34:06 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4040000) [ 1059.451599] attempt to access beyond end of device [ 1059.456577] loop3: rw=1, want=421, limit=63 [ 1059.457041] hid-generic 0000:0000:0000.01A2: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:06 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x3f00) 11:34:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1059.587064] hid-generic 0000:0000:0000.01A3: ignoring exceeding usage max [ 1059.674399] hid-generic 0000:0000:0000.01A3: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:07 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x5000000) [ 1059.718169] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1059.809109] hid-generic 0000:0000:0000.01A4: ignoring exceeding usage max [ 1059.844837] hid-generic 0000:0000:0000.01A4: hidraw1: HID v0.00 Device [syz1] on %z5 11:34:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1059.928797] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1060.055015] hid-generic 0000:0000:0000.01A5: ignoring exceeding usage max [ 1060.102783] hid-generic 0000:0000:0000.01A5: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1061.028027] attempt to access beyond end of device [ 1061.033095] loop5: rw=2049, want=78, limit=63 [ 1061.037616] attempt to access beyond end of device [ 1061.043647] loop5: rw=2049, want=79, limit=63 [ 1061.048915] attempt to access beyond end of device [ 1061.053847] loop5: rw=2049, want=80, limit=63 [ 1061.059262] attempt to access beyond end of device [ 1061.064361] loop5: rw=2049, want=81, limit=63 [ 1061.069988] attempt to access beyond end of device [ 1061.075571] loop5: rw=2049, want=130, limit=63 [ 1061.086469] attempt to access beyond end of device [ 1061.092052] loop5: rw=2049, want=131, limit=63 [ 1061.096760] attempt to access beyond end of device [ 1061.102209] loop5: rw=2049, want=132, limit=63 [ 1061.106922] attempt to access beyond end of device [ 1061.112218] loop5: rw=2049, want=133, limit=63 [ 1061.116925] attempt to access beyond end of device [ 1061.122246] loop5: rw=2049, want=142, limit=63 [ 1061.127131] attempt to access beyond end of device [ 1061.132181] loop5: rw=2049, want=143, limit=63 [ 1061.136960] attempt to access beyond end of device [ 1061.141993] loop5: rw=2049, want=144, limit=63 [ 1061.146600] attempt to access beyond end of device [ 1061.151568] loop5: rw=2049, want=145, limit=63 [ 1061.159728] attempt to access beyond end of device [ 1061.164668] loop5: rw=2049, want=4241, limit=63 [ 1061.173826] attempt to access beyond end of device [ 1061.178849] loop5: rw=2049, want=8337, limit=63 [ 1061.187760] attempt to access beyond end of device [ 1061.192772] loop5: rw=2049, want=12433, limit=63 [ 1061.203881] attempt to access beyond end of device [ 1061.209271] loop5: rw=2049, want=16529, limit=63 [ 1061.217831] attempt to access beyond end of device [ 1061.222850] loop5: rw=2049, want=20625, limit=63 11:34:08 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4000) 11:34:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x6d) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:08 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x5040000) 11:34:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x30, 0x1a, 0x0, 0x1, [@AF_BRIDGE={0x4}, @AF_MPLS={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x20, 0x2, 0x0, 0x1, {0x1c, 0x1, 0x0, 0x1, [{0x8, 0x1f, 0x0, 0x0, 0x5d}, {0x8, 0x3, 0x0, 0x0, 0x8ea4}, {0x8, 0x1b, 0x0, 0x0, 0xff4}]}}]}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x58}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005a80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005a40)={&(0x7f0000005240)={0x7dc, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x400}}, {0x8}}}]}}, {{0x8}, {0x108, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x100}}}]}}, {{0x8}, {0x250, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r1}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x49a}}}]}}, {{0x8, 0x1, r4}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}]}}]}, 0x7dc}, 0x1, 0x0, 0x0, 0x40800}, 0x4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r5 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r6, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r6, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1061.233978] attempt to access beyond end of device [ 1061.238960] loop5: rw=2049, want=24721, limit=63 [ 1061.247794] attempt to access beyond end of device [ 1061.252903] loop5: rw=2049, want=28817, limit=63 [ 1061.261569] attempt to access beyond end of device [ 1061.266548] loop5: rw=2049, want=32881, limit=63 [ 1061.411548] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1061.413012] hid-generic 0000:0000:0000.01A6: ignoring exceeding usage max 11:34:08 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6000000) 11:34:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1061.538549] hid-generic 0000:0000:0000.01A6: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1061.660477] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:09 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x40dc) [ 1061.774383] hid-generic 0000:0000:0000.01A7: ignoring exceeding usage max 11:34:09 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6040000) [ 1061.822944] hid-generic 0000:0000:0000.01A7: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1061.848291] hid-generic 0000:0000:0000.01A8: ignoring exceeding usage max 11:34:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1061.930329] hid-generic 0000:0000:0000.01A8: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1062.029246] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1062.232949] hid-generic 0000:0000:0000.01A9: ignoring exceeding usage max [ 1062.280730] hid-generic 0000:0000:0000.01A9: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1063.328728] attempt to access beyond end of device [ 1063.333704] loop5: rw=2049, want=78, limit=63 [ 1063.338319] attempt to access beyond end of device [ 1063.343246] loop5: rw=2049, want=79, limit=63 [ 1063.348204] attempt to access beyond end of device [ 1063.353129] loop5: rw=2049, want=80, limit=63 [ 1063.357865] attempt to access beyond end of device [ 1063.362969] loop5: rw=2049, want=81, limit=63 [ 1063.367759] attempt to access beyond end of device [ 1063.372697] loop5: rw=2049, want=130, limit=63 [ 1063.377332] attempt to access beyond end of device [ 1063.382373] loop5: rw=2049, want=131, limit=63 [ 1063.386987] attempt to access beyond end of device [ 1063.391970] loop5: rw=2049, want=132, limit=63 [ 1063.396865] attempt to access beyond end of device [ 1063.401969] loop5: rw=2049, want=133, limit=63 [ 1063.406605] attempt to access beyond end of device [ 1063.411635] loop5: rw=2049, want=142, limit=63 [ 1063.416247] attempt to access beyond end of device [ 1063.421261] loop5: rw=2049, want=143, limit=63 [ 1063.425887] attempt to access beyond end of device [ 1063.431039] loop5: rw=2049, want=144, limit=63 [ 1063.435668] attempt to access beyond end of device [ 1063.441332] loop5: rw=2049, want=145, limit=63 [ 1063.449425] attempt to access beyond end of device [ 1063.454561] loop5: rw=2049, want=4241, limit=63 [ 1063.466886] attempt to access beyond end of device [ 1063.471987] loop5: rw=2049, want=8337, limit=63 [ 1063.485485] attempt to access beyond end of device [ 1063.490631] loop5: rw=2049, want=12433, limit=63 [ 1063.502130] attempt to access beyond end of device [ 1063.507092] loop5: rw=2049, want=16529, limit=63 [ 1063.521247] attempt to access beyond end of device [ 1063.526363] loop5: rw=2049, want=20625, limit=63 11:34:10 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4800) 11:34:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x6e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:10 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7000000) 11:34:10 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) dup(0xffffffffffffffff) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000004c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x7, 0x3, 0x9, 0x8, 0x0, 0x7fffffff, 0x81, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x9, 0x4}, 0xc486, 0x3c1ec03b, 0x7, 0x4, 0x5, 0x3, 0x7ff}, r2, 0x7, r0, 0xb) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) ioctl$VIDIOC_CREATE_BUFS(r4, 0xc100565c, &(0x7f0000000180)={0x7, 0xffff, 0x4, {0x7, @sliced={0x200, [0x8, 0x3, 0x7, 0xff, 0x80, 0x4000, 0x8, 0x3, 0x5dd7, 0x6, 0x401, 0x1000, 0xaa, 0xfff, 0x2, 0x31a8, 0x7, 0x80, 0x5, 0x2, 0x100, 0x7, 0x9, 0x6, 0x5, 0x1000, 0x0, 0x1, 0xb98, 0x7, 0x1ff, 0x7ff, 0x4, 0x602c, 0xd80, 0xff8, 0x7, 0xf63, 0x9, 0x101, 0x5, 0x1, 0x5, 0xfffe, 0x3, 0x40, 0xfc01, 0x2], 0xa17a}}, 0x1}) socket$inet_tcp(0x2, 0x1, 0x0) [ 1063.535611] attempt to access beyond end of device [ 1063.540861] loop5: rw=2049, want=24721, limit=63 [ 1063.551707] attempt to access beyond end of device [ 1063.556766] loop5: rw=2049, want=28817, limit=63 [ 1063.566309] attempt to access beyond end of device [ 1063.572023] loop5: rw=2049, want=32881, limit=63 [ 1063.720793] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1063.740512] hid-generic 0000:0000:0000.01AA: ignoring exceeding usage max [ 1063.806088] hid-generic 0000:0000:0000.01AA: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:11 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:11 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7040000) 11:34:11 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x4c00) [ 1063.936923] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1064.078358] hid-generic 0000:0000:0000.01AB: ignoring exceeding usage max 11:34:11 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1064.160788] hid-generic 0000:0000:0000.01AB: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1064.172452] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1064.273752] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:11 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x8040000) [ 1064.444313] hid-generic 0000:0000:0000.01AC: ignoring exceeding usage max [ 1064.521930] hid-generic 0000:0000:0000.01AC: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1065.529124] attempt to access beyond end of device [ 1065.534190] loop5: rw=2049, want=78, limit=63 [ 1065.540024] buffer_io_error: 26 callbacks suppressed [ 1065.540034] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1065.553980] attempt to access beyond end of device [ 1065.559494] loop5: rw=2049, want=79, limit=63 [ 1065.563987] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1065.572651] attempt to access beyond end of device [ 1065.578323] loop5: rw=2049, want=80, limit=63 [ 1065.582912] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1065.590873] attempt to access beyond end of device [ 1065.595819] loop5: rw=2049, want=81, limit=63 [ 1065.600404] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1065.608277] attempt to access beyond end of device [ 1065.613207] loop5: rw=2049, want=114, limit=63 [ 1065.618194] Buffer I/O error on dev loop5, logical block 113, lost async page write [ 1065.626372] attempt to access beyond end of device [ 1065.631409] loop5: rw=2049, want=115, limit=63 [ 1065.636011] Buffer I/O error on dev loop5, logical block 114, lost async page write [ 1065.643938] attempt to access beyond end of device [ 1065.648967] loop5: rw=2049, want=116, limit=63 [ 1065.653558] Buffer I/O error on dev loop5, logical block 115, lost async page write [ 1065.661468] attempt to access beyond end of device [ 1065.666394] loop5: rw=2049, want=117, limit=63 [ 1065.671036] Buffer I/O error on dev loop5, logical block 116, lost async page write [ 1065.679170] attempt to access beyond end of device [ 1065.684121] loop5: rw=2049, want=130, limit=63 [ 1065.689414] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 1065.697277] attempt to access beyond end of device [ 1065.702352] loop5: rw=2049, want=131, limit=63 [ 1065.706950] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 1065.714849] attempt to access beyond end of device [ 1065.719915] loop5: rw=2049, want=132, limit=63 [ 1065.724585] attempt to access beyond end of device [ 1065.729565] loop5: rw=2049, want=133, limit=63 [ 1065.736972] attempt to access beyond end of device [ 1065.741999] loop5: rw=2049, want=4237, limit=63 [ 1065.751113] attempt to access beyond end of device [ 1065.756042] loop5: rw=2049, want=8333, limit=63 [ 1065.765722] attempt to access beyond end of device [ 1065.770723] loop5: rw=2049, want=12429, limit=63 [ 1065.781093] attempt to access beyond end of device [ 1065.786138] loop5: rw=2049, want=16525, limit=63 [ 1065.795402] attempt to access beyond end of device [ 1065.800415] loop5: rw=2049, want=20621, limit=63 [ 1065.809425] attempt to access beyond end of device [ 1065.814385] loop5: rw=2049, want=24717, limit=63 [ 1065.822285] attempt to access beyond end of device 11:34:13 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x6f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:13 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x9000000) 11:34:13 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6000) 11:34:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141e42, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r3, r2) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000080)={0x7d, 0x2, 0x4, 0x0, 0x9, {0x0, 0x2710}, {0x5, 0x2, 0x3f, 0xfe, 0x0, 0x5, "525794b5"}, 0x7cf8, 0x0, @planes=&(0x7f0000000040)={0x80000001, 0x2a, @userptr=0x3, 0xb7f}, 0x2, 0x0, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00127b497db85950560fce8e22743c1a4fb225ef7a8baf73aaa5f6fc4be20101da72cde042155e636c18cd87a56754c17fc356250d8159c2d4", @ANYRES16=r6, @ANYBLOB="0100001100000000000002000000"], 0x14}}, 0x0) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000400)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000680)={0x58, r6, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'macvlan0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20004004}, 0x40000) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1065.827226] loop5: rw=2049, want=24885, limit=63 [ 1065.940020] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:13 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1066.040523] hid-generic 0000:0000:0000.01AD: ignoring exceeding usage max 11:34:13 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x9040000) [ 1066.094107] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1066.101355] hid-generic 0000:0000:0000.01AE: ignoring exceeding usage max [ 1066.123495] hid-generic 0000:0000:0000.01AD: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1066.136706] hid-generic 0000:0000:0000.01AE: hidraw1: HID v0.00 Device [syz1] on %z5 11:34:13 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6800) 11:34:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:13 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1066.384490] hid-generic 0000:0000:0000.01AF: ignoring exceeding usage max 11:34:13 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xa040000) [ 1066.461574] hid-generic 0000:0000:0000.01AF: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) [ 1066.532259] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1066.675042] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1066.704864] hid-generic 0000:0000:0000.01B0: ignoring exceeding usage max [ 1066.770426] hid-generic 0000:0000:0000.01B0: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1066.862860] hid-generic 0000:0000:0000.01B1: ignoring exceeding usage max [ 1066.905745] hid-generic 0000:0000:0000.01B1: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1066.935241] attempt to access beyond end of device [ 1066.942459] loop3: rw=1, want=885, limit=63 [ 1066.947788] attempt to access beyond end of device [ 1066.952738] loop3: rw=2049, want=78, limit=63 [ 1066.981211] attempt to access beyond end of device [ 1066.986446] loop3: rw=2049, want=79, limit=63 [ 1066.994932] attempt to access beyond end of device [ 1067.001101] loop3: rw=2049, want=80, limit=63 [ 1067.005739] attempt to access beyond end of device [ 1067.012622] loop3: rw=2049, want=81, limit=63 [ 1067.017241] attempt to access beyond end of device [ 1067.024255] loop3: rw=2049, want=114, limit=63 [ 1067.029590] attempt to access beyond end of device [ 1067.034619] loop3: rw=2049, want=115, limit=63 [ 1067.040659] attempt to access beyond end of device [ 1067.045618] loop3: rw=2049, want=116, limit=63 [ 1067.051125] attempt to access beyond end of device [ 1067.056057] loop3: rw=2049, want=117, limit=63 [ 1067.077726] attempt to access beyond end of device [ 1067.082699] loop3: rw=2049, want=130, limit=63 [ 1067.107933] attempt to access beyond end of device [ 1067.124665] loop3: rw=2049, want=131, limit=63 [ 1067.135075] attempt to access beyond end of device [ 1067.154253] loop3: rw=2049, want=132, limit=63 [ 1067.171420] attempt to access beyond end of device [ 1067.186580] loop3: rw=2049, want=133, limit=63 [ 1067.192712] attempt to access beyond end of device [ 1067.203675] loop3: rw=2049, want=157, limit=63 [ 1067.209851] attempt to access beyond end of device [ 1067.214920] loop3: rw=2049, want=893, limit=63 [ 1067.869167] attempt to access beyond end of device [ 1067.874145] loop5: rw=2049, want=78, limit=63 [ 1067.879273] attempt to access beyond end of device [ 1067.884218] loop5: rw=2049, want=79, limit=63 [ 1067.889388] attempt to access beyond end of device [ 1067.894341] loop5: rw=2049, want=80, limit=63 [ 1067.899263] attempt to access beyond end of device [ 1067.904208] loop5: rw=2049, want=81, limit=63 [ 1067.910460] attempt to access beyond end of device [ 1067.915870] loop5: rw=2049, want=114, limit=63 [ 1067.920571] attempt to access beyond end of device [ 1067.925499] loop5: rw=2049, want=115, limit=63 [ 1067.930558] attempt to access beyond end of device [ 1067.935492] loop5: rw=2049, want=116, limit=63 [ 1067.940220] attempt to access beyond end of device [ 1067.945254] loop5: rw=2049, want=117, limit=63 [ 1067.950378] attempt to access beyond end of device [ 1067.955367] loop5: rw=2049, want=130, limit=63 [ 1067.960062] attempt to access beyond end of device [ 1067.964993] loop5: rw=2049, want=131, limit=63 [ 1067.969741] attempt to access beyond end of device [ 1067.974799] loop5: rw=2049, want=132, limit=63 [ 1067.979518] attempt to access beyond end of device [ 1067.984540] loop5: rw=2049, want=133, limit=63 [ 1067.993019] attempt to access beyond end of device [ 1067.998308] loop5: rw=2049, want=4237, limit=63 [ 1068.006870] attempt to access beyond end of device [ 1068.011987] loop5: rw=2049, want=8333, limit=63 [ 1068.022504] attempt to access beyond end of device [ 1068.027737] loop5: rw=2049, want=12429, limit=63 [ 1068.036569] attempt to access beyond end of device [ 1068.041682] loop5: rw=2049, want=16525, limit=63 [ 1068.051619] attempt to access beyond end of device [ 1068.056757] loop5: rw=2049, want=20621, limit=63 [ 1068.065938] attempt to access beyond end of device 11:34:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x70) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:15 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:15 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6c00) 11:34:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) 11:34:15 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xb040000) 11:34:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1068.071002] loop5: rw=2049, want=24717, limit=63 [ 1068.077775] attempt to access beyond end of device [ 1068.082722] loop5: rw=2049, want=25429, limit=63 11:34:15 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0xd000000) [ 1068.210333] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1068.238790] hid-generic 0000:0000:0000.01B2: ignoring exceeding usage max [ 1068.256496] hid-generic 0000:0000:0000.01B2: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:15 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1068.382128] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:15 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x6e00) [ 1068.494398] hid-generic 0000:0000:0000.01B3: ignoring exceeding usage max 11:34:15 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, 0x0, 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1068.557382] hid-generic 0000:0000:0000.01B3: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:15 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x19000000) [ 1068.693288] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1068.761859] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1069.879491] attempt to access beyond end of device [ 1069.886044] loop5: rw=2049, want=78, limit=63 [ 1069.892416] attempt to access beyond end of device [ 1069.898377] loop5: rw=2049, want=79, limit=63 [ 1069.902941] attempt to access beyond end of device [ 1069.909503] loop5: rw=2049, want=80, limit=63 [ 1069.914915] attempt to access beyond end of device [ 1069.920651] loop5: rw=2049, want=81, limit=63 [ 1069.925252] attempt to access beyond end of device [ 1069.932398] loop5: rw=2049, want=114, limit=63 [ 1069.938133] attempt to access beyond end of device [ 1069.943150] loop5: rw=2049, want=115, limit=63 [ 1069.949280] attempt to access beyond end of device [ 1069.958402] loop5: rw=2049, want=116, limit=63 [ 1069.963075] attempt to access beyond end of device [ 1069.968836] loop5: rw=2049, want=117, limit=63 [ 1069.973445] attempt to access beyond end of device [ 1069.979170] loop5: rw=2049, want=130, limit=63 [ 1069.983945] attempt to access beyond end of device [ 1069.990139] loop5: rw=2049, want=131, limit=63 [ 1069.995460] attempt to access beyond end of device [ 1070.001175] loop5: rw=2049, want=132, limit=63 [ 1070.005786] attempt to access beyond end of device [ 1070.011519] loop5: rw=2049, want=133, limit=63 [ 1070.021049] attempt to access beyond end of device [ 1070.026017] loop5: rw=2049, want=4237, limit=63 [ 1070.035284] attempt to access beyond end of device [ 1070.041153] loop5: rw=2049, want=8333, limit=63 [ 1070.050449] attempt to access beyond end of device [ 1070.055376] loop5: rw=2049, want=12429, limit=63 [ 1070.064908] attempt to access beyond end of device [ 1070.070583] loop5: rw=2049, want=16525, limit=63 [ 1070.080980] attempt to access beyond end of device [ 1070.085928] loop5: rw=2049, want=20621, limit=63 [ 1070.095528] attempt to access beyond end of device [ 1070.100933] loop5: rw=2049, want=24717, limit=63 [ 1070.116533] attempt to access beyond end of device [ 1070.122476] loop5: rw=2049, want=28813, limit=63 11:34:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x71) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:17 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7400) 11:34:17 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, 0x0, 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:17 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1a000000) 11:34:17 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r0, 0xffffffffffffffff) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x12020020}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4048010}, 0x4884) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x6, 0xb2, 0x1, 0xfffffff8, 0x1}) write$UHID_INPUT(r2, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r2, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0), &(0x7f00000001c0)=0x8) write$UHID_CREATE2(r3, &(0x7f0000000240)=ANY=[@ANYRESDEC=r1], 0x12e) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r4, r3) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x40, 0x1, 0x7}}, 0x14) [ 1070.131469] attempt to access beyond end of device [ 1070.136417] loop5: rw=2049, want=30125, limit=63 [ 1070.182891] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1070.307195] hid-generic 0000:0000:0000.01B4: ignoring exceeding usage max 11:34:17 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, 0x0, 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:17 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7a00) 11:34:17 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1b000000) [ 1070.401980] hid-generic 0000:0000:0000.01B4: hidraw0: HID v0.00 Device [syz1] on %z5 11:34:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:17 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1070.541906] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1070.662866] hid-generic 0000:0000:0000.01B5: ignoring exceeding usage max [ 1070.686754] hid-generic 0000:0000:0000.01B5: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1070.709213] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1071.786622] attempt to access beyond end of device [ 1071.791664] loop5: rw=2049, want=78, limit=63 [ 1071.796157] buffer_io_error: 38 callbacks suppressed [ 1071.796163] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 1071.809180] attempt to access beyond end of device [ 1071.814117] loop5: rw=2049, want=79, limit=63 [ 1071.818708] Buffer I/O error on dev loop5, logical block 78, lost async page write [ 1071.826498] attempt to access beyond end of device [ 1071.831628] loop5: rw=2049, want=80, limit=63 [ 1071.836215] Buffer I/O error on dev loop5, logical block 79, lost async page write [ 1071.844179] attempt to access beyond end of device [ 1071.849491] loop5: rw=2049, want=81, limit=63 [ 1071.854165] Buffer I/O error on dev loop5, logical block 80, lost async page write [ 1071.864654] attempt to access beyond end of device [ 1071.869961] loop5: rw=2049, want=114, limit=63 [ 1071.874552] Buffer I/O error on dev loop5, logical block 113, lost async page write [ 1071.882470] attempt to access beyond end of device [ 1071.887559] loop5: rw=2049, want=115, limit=63 [ 1071.892138] Buffer I/O error on dev loop5, logical block 114, lost async page write [ 1071.900074] attempt to access beyond end of device [ 1071.905006] loop5: rw=2049, want=116, limit=63 [ 1071.909676] Buffer I/O error on dev loop5, logical block 115, lost async page write [ 1071.917766] attempt to access beyond end of device [ 1071.922693] loop5: rw=2049, want=117, limit=63 [ 1071.927351] Buffer I/O error on dev loop5, logical block 116, lost async page write [ 1071.935264] attempt to access beyond end of device [ 1071.940276] loop5: rw=2049, want=130, limit=63 [ 1071.944871] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 1071.952782] attempt to access beyond end of device [ 1071.957826] loop5: rw=2049, want=131, limit=63 [ 1071.962510] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 1071.970845] attempt to access beyond end of device [ 1071.975781] loop5: rw=2049, want=132, limit=63 [ 1071.980496] attempt to access beyond end of device [ 1071.985584] loop5: rw=2049, want=133, limit=63 [ 1071.993816] attempt to access beyond end of device [ 1071.999142] loop5: rw=2049, want=4237, limit=63 [ 1072.007899] attempt to access beyond end of device [ 1072.012851] loop5: rw=2049, want=8333, limit=63 [ 1072.025142] attempt to access beyond end of device [ 1072.030192] loop5: rw=2049, want=12429, limit=63 [ 1072.040592] attempt to access beyond end of device [ 1072.045539] loop5: rw=2049, want=16525, limit=63 [ 1072.055162] attempt to access beyond end of device [ 1072.060291] loop5: rw=2049, want=20621, limit=63 [ 1072.068913] attempt to access beyond end of device [ 1072.073863] loop5: rw=2049, want=24717, limit=63 [ 1072.084564] attempt to access beyond end of device 11:34:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r1, 0x4000, 0x0, 0x72) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) 11:34:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:19 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7e00) 11:34:19 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1c000000) 11:34:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r2, r1) symlinkat(&(0x7f0000000040)='./bus\x00', r2, &(0x7f0000000080)='./file0\x00') fchdir(r0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000ecdf40e65cc780220000000000000000000000000000000300df0000000000000000000084000000000000000000000000000000000000000000000000200000000000000000000000000000000001000000000000000000000000000000000100258d7a3500000000000000000000000000000000000000000000feffffff00000000000000000000000000000074b6628ddfb1cc186d6300000000000000000073797a310000000000000000000000010000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4a28054000393898804c41c2993fc67e8a146045e14e8a0800550e6a25935bc1a90cf5754cb4b20731955457a0851ce42cc16441b8fee3425d2ed6555b6be4a2c14f977460740ec4687e98b5a668004049f41ba20ce060a79f83fa23a751c3f475421f05d7485783130cb1bedf"], 0x12e) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r5, r4) ioctl$KVM_IRQ_LINE(r5, 0x4008ae61, &(0x7f00000000c0)={0x7, 0x63d3}) write$UHID_INPUT(r3, &(0x7f0000001440)={0x8, {'\x00', 0x63}}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) fadvise64(r3, 0x4000, 0x0, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 1072.089655] loop5: rw=2049, want=28813, limit=63 [ 1072.100955] attempt to access beyond end of device [ 1072.105924] loop5: rw=2049, want=32877, limit=63 [ 1072.231526] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1072.289055] hid-generic 0000:0000:0000.01B6: ignoring exceeding usage max [ 1072.313353] hid-generic 0000:0000:0000.01B7: ignoring exceeding usage max 11:34:19 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1d000000) [ 1072.342526] hid-generic 0000:0000:0000.01B6: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1072.369578] hid-generic 0000:0000:0000.01B7: hidraw1: HID v0.00 Device [syz1] on %z5 11:34:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1072.414971] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted 11:34:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 11:34:19 executing program 0: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x12e) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x7f00) [ 1072.564940] attempt to access beyond end of device 11:34:19 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in=@multicast2}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@dev}, 0x0, @in=@private}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x1e000000) [ 1072.590416] loop3: rw=1, want=2481, limit=63 11:34:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000040)={0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 1072.646231] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1072.694531] hid-generic 0000:0000:0000.01B8: ignoring exceeding usage max [ 1072.718459] hid-generic 0000:0000:0000.01B8: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1072.824338] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted [ 1073.000677] hid-generic 0000:0000:0000.01B9: ignoring exceeding usage max [ 1073.025428] hid-generic 0000:0000:0000.01B9: hidraw0: HID v0.00 Device [syz1] on %z5 [ 1073.107935] INFO: trying to register non-static key. [ 1073.113065] the code is fine but needs lockdep annotation. [ 1073.118716] turning off the locking correctness validator. [ 1073.124358] CPU: 0 PID: 23536 Comm: syz-executor.3 Not tainted 4.19.126-syzkaller #0 [ 1073.132327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.141766] Call Trace: [ 1073.144363] dump_stack+0x1fc/0x2fe [ 1073.148085] register_lock_class+0xfbb/0x11b0 [ 1073.153109] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1073.157700] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1073.162805] ? static_obj+0x50/0x50 [ 1073.166440] __lock_acquire+0x191/0x4380 [ 1073.170612] ? wake_up_q+0xa5/0xf0 [ 1073.174155] ? drop_futex_key_refs.isra.0+0x58/0xc0 [ 1073.179173] ? futex_wake+0x164/0x490 [ 1073.182981] ? mark_held_locks+0xf0/0xf0 [ 1073.187230] ? drop_futex_key_refs.isra.0+0xc0/0xc0 [ 1073.192267] lock_acquire+0x170/0x3c0 [ 1073.196079] ? __wake_up_common_lock+0xb0/0x170 [ 1073.200752] _raw_spin_lock_irqsave+0x8c/0xc0 [ 1073.205287] ? __wake_up_common_lock+0xb0/0x170 [ 1073.209960] __wake_up_common_lock+0xb0/0x170 [ 1073.214550] ? __wake_up_common+0x640/0x640 [ 1073.218963] ? fsnotify_first_mark+0x200/0x200 [ 1073.223562] ? locks_remove_file+0x2d3/0x450 [ 1073.228040] ? uhid_dev_destroy+0x100/0x100 [ 1073.232454] uhid_dev_destroy+0x6f/0x100 [ 1073.236523] uhid_char_release+0x4e/0xb0 [ 1073.240657] __fput+0x2cd/0x890 [ 1073.244118] task_work_run+0x13f/0x1b0 [ 1073.248018] exit_to_usermode_loop+0x251/0x2a0 [ 1073.252634] do_syscall_64+0x538/0x620 [ 1073.256725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.261919] RIP: 0033:0x416661 [ 1073.265112] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1073.284155] RSP: 002b:00007ffe08e96e80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1073.291872] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416661 [ 1073.299150] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 0000000000000003 [ 1073.306489] RBP: 0000000000000000 R08: 0000000000793020 R09: 0000000000000000 [ 1073.313912] R10: 00007ffe08e96f60 R11: 0000000000000293 R12: 0000000000793028 [ 1073.321857] R13: 0000000000000004 R14: ffffffffffffffff R15: 000000000078c18c [ 1073.329216] kasan: CONFIG_KASAN_INLINE enabled [ 1073.333774] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1073.341218] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1073.347529] CPU: 0 PID: 23536 Comm: syz-executor.3 Not tainted 4.19.126-syzkaller #0 [ 1073.355396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.364740] RIP: 0010:__wake_up_common+0xdf/0x640 [ 1073.369569] Code: 05 00 00 4c 8b 43 38 49 83 e8 18 49 8d 78 18 48 39 3c 24 0f 84 6a 02 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 <80> 3c 01 00 0f 85 3b 05 00 00 49 8b 40 18 89 54 24 10 31 db 48 bd [ 1073.388463] RSP: 0018:ffff8880922afcb0 EFLAGS: 00010046 [ 1073.393806] RAX: dffffc0000000000 RBX: ffff888089e6ab88 RCX: 0000000000000000 [ 1073.401068] RDX: 0000000000000001 RSI: 1ffffffff11f8910 RDI: 0000000000000000 [ 1073.408340] RBP: 0000000000000001 R08: ffffffffffffffe8 R09: ffff8880922afd50 [ 1073.416159] R10: ffffed10113cd571 R11: ffff888089e6ab8b R12: 0000000000000001 [ 1073.423412] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1073.434572] FS: 000000000296c940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1073.442972] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1073.448834] CR2: 00007f16c9e42db8 CR3: 00000000a7e01000 CR4: 00000000001406f0 [ 1073.456090] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1073.463353] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1073.470615] Call Trace: [ 1073.473205] __wake_up_common_lock+0xcd/0x170 [ 1073.477707] ? __wake_up_common+0x640/0x640 [ 1073.482100] ? fsnotify_first_mark+0x200/0x200 [ 1073.486763] ? locks_remove_file+0x2d3/0x450 [ 1073.491155] ? uhid_dev_destroy+0x100/0x100 [ 1073.495556] uhid_dev_destroy+0x6f/0x100 [ 1073.499800] uhid_char_release+0x4e/0xb0 [ 1073.503863] __fput+0x2cd/0x890 [ 1073.507129] task_work_run+0x13f/0x1b0 [ 1073.511006] exit_to_usermode_loop+0x251/0x2a0 [ 1073.515584] do_syscall_64+0x538/0x620 [ 1073.519462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.524633] RIP: 0033:0x416661 [ 1073.527903] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1073.546810] RSP: 002b:00007ffe08e96e80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1073.554948] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416661 [ 1073.562200] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 0000000000000003 [ 1073.569453] RBP: 0000000000000000 R08: 0000000000793020 R09: 0000000000000000 [ 1073.576706] R10: 00007ffe08e96f60 R11: 0000000000000293 R12: 0000000000793028 [ 1073.583960] R13: 0000000000000004 R14: ffffffffffffffff R15: 000000000078c18c [ 1073.591307] Modules linked in: [ 1073.594495] ---[ end trace 111d0fe6296985f1 ]--- [ 1073.599263] RIP: 0010:__wake_up_common+0xdf/0x640 [ 1073.604108] Code: 05 00 00 4c 8b 43 38 49 83 e8 18 49 8d 78 18 48 39 3c 24 0f 84 6a 02 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 <80> 3c 01 00 0f 85 3b 05 00 00 49 8b 40 18 89 54 24 10 31 db 48 bd [ 1073.623067] RSP: 0018:ffff8880922afcb0 EFLAGS: 00010046 [ 1073.628432] RAX: dffffc0000000000 RBX: ffff888089e6ab88 RCX: 0000000000000000 [ 1073.635683] RDX: 0000000000000001 RSI: 1ffffffff11f8910 RDI: 0000000000000000 [ 1073.642952] RBP: 0000000000000001 R08: ffffffffffffffe8 R09: ffff8880922afd50 [ 1073.650217] R10: ffffed10113cd571 R11: ffff888089e6ab8b R12: 0000000000000001 [ 1073.657474] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1073.664743] FS: 000000000296c940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1073.672960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1073.678832] CR2: 00007f16c9e42db8 CR3: 00000000a7e01000 CR4: 00000000001406f0 [ 1073.686086] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1073.693339] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1073.702161] Kernel panic - not syncing: Fatal exception [ 1073.708944] Kernel Offset: disabled [ 1073.712682] Rebooting in 86400 seconds..