0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xc}, {0x8, 0x1}, {0x3}, {0xb}, {0x7, 0x3}]}, @ptr={0x7, 0x0, 0x0, 0x2, 0x4}, @enum={0x5, 0xa, 0x0, 0x6, 0x4, [{0xc}, {0x3}, {0x2, 0xffffffff}, {0xd, 0x100}, {0xb, 0x7}, {0x1, 0xffffffff}, {0x10, 0x6}, {0x0, 0x20000}, {0x9, 0x20}, {0x9, 0x4}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{0xf, 0x7}, {0x7, 0x40000000}, {0x4, 0x7}, {0xf, 0x8}, {0x0, 0x6fb}]}, @func={0x3, 0x0, 0x0, 0xc, 0x3}, @restrict={0x4, 0x0, 0x0, 0xb, 0x1}, @var={0x4, 0x0, 0x0, 0xe, 0x2, 0x1}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0xb}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x0]}}, &(0x7f0000000440)=""/210, 0x12f, 0xd2, 0x1}, 0x20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000900)={0x9}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000140)={0x9, {0x1, 0x8, 0x1ff, 0x101}, {0x1, 0x7fff, 0xffffffff, 0x9}, {0x8b95, 0x5}}) ptrace$cont(0x7, r0, 0x0, 0x0) 04:37:54 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:37:54 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) poll(&(0x7f0000000400)=[{r0, 0x40}], 0x1, 0x7) 04:37:54 executing program 1: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) [ 2815.039179][T31705] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2815.065757][T31705] EXT4-fs (loop4): group descriptors corrupted! 04:37:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc0000000300000000000000010000010000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b00000500"/247], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:37:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:37:54 executing program 3: r0 = socket(0x18, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000000), 0x45) 04:37:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) [ 2815.293081][T22548] usb 6-1: new high-speed USB device number 67 using dummy_hcd 04:37:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:37:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:37:55 executing program 3: getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff]) setregid(r0, r1) 04:37:55 executing program 1: r0 = socket$inet6(0x18, 0x1, 0x0) fcntl$setown(r0, 0x6, 0x0) 04:37:55 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)) [ 2815.684537][T31741] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2815.696301][T31741] EXT4-fs (loop4): group descriptors corrupted! [ 2815.710781][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2815.749688][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2815.783373][T22548] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2815.819443][T22548] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2815.840056][T22548] usb 6-1: config 0 descriptor?? [ 2816.093755][T31701] udc-core: couldn't find an available UDC or it's busy [ 2816.100819][T31701] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2816.331110][T22548] keytouch 0003:0926:3333.009C: fixing up Keytouch IEC report descriptor [ 2816.349015][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.009C/input/input85 [ 2816.432333][T22548] keytouch 0003:0926:3333.009C: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2816.542192][ T1188] usb 6-1: USB disconnect, device number 67 04:37:56 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:37:56 executing program 1: syz_emit_ethernet(0xc4, &(0x7f0000000140)={@local, @remote, @val, {@ipv4}}, 0x0) 04:37:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2817.076566][T31805] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2817.088332][T31805] EXT4-fs (loop4): group descriptors corrupted! [ 2817.156445][T31805] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2817.169933][T31805] EXT4-fs (loop4): group descriptors corrupted! [ 2817.360579][ T1188] usb 6-1: new high-speed USB device number 68 using dummy_hcd [ 2817.720818][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2817.731715][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2817.744329][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2817.753750][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2817.765991][ T1188] usb 6-1: config 0 descriptor?? [ 2818.014274][T31808] udc-core: couldn't find an available UDC or it's busy [ 2818.021278][T31808] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:37:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x40000, 0x4, 0x0, 0x6, 0x4, [{0xfffffffe}, {0x0, 0x40000}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x200000}, {}]}]}}, 0x0, 0xf6}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:37:57 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000040)={@local, @remote, @val, {@ipv4}}, 0x0) 04:37:57 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) 04:37:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2818.175295][T31829] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2818.192098][T31829] EXT4-fs (loop4): group descriptors corrupted! [ 2818.251056][ T1188] keytouch 0003:0926:3333.009D: fixing up Keytouch IEC report descriptor [ 2818.280067][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.009D/input/input86 [ 2818.371907][ T1188] keytouch 0003:0926:3333.009D: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2818.460040][ T1188] usb 6-1: USB disconnect, device number 68 04:37:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:37:58 executing program 3: syz_emit_ethernet(0x26, &(0x7f00000001c0)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 04:37:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2e00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:37:58 executing program 1: socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f0000002700)=""/176, 0xb0}], 0x1, &(0x7f0000003bc0)=""/20, 0x14}, 0x0) socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights, @rights], 0x28}, 0x0) 04:37:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0xc, &(0x7f0000000100)={@multicast2}, 0x8) [ 2818.708876][T31888] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2818.720962][T31888] EXT4-fs (loop4): group descriptors corrupted! 04:37:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:37:58 executing program 3: syz_emit_ethernet(0x87, &(0x7f0000000080)={@local, @random="c19fb0bb5696", @val, {@ipv6}}, 0x0) 04:37:58 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2818.993238][T31906] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2819.005862][T31906] EXT4-fs (loop4): group descriptors corrupted! [ 2819.054227][T31906] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2819.064621][T31906] EXT4-fs (loop4): group descriptors corrupted! [ 2819.270513][T18219] usb 6-1: new high-speed USB device number 69 using dummy_hcd [ 2819.660646][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2819.671553][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2819.688247][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2819.700590][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2819.709274][T18219] usb 6-1: config 0 descriptor?? [ 2819.963055][T31907] udc-core: couldn't find an available UDC or it's busy [ 2819.970023][T31907] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2820.201145][T18219] keytouch 0003:0926:3333.009E: fixing up Keytouch IEC report descriptor [ 2820.219700][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.009E/input/input87 [ 2820.303643][T18219] keytouch 0003:0926:3333.009E: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2820.412529][T18219] usb 6-1: USB disconnect, device number 69 04:38:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x200}, 0x98) 04:38:00 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 04:38:00 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r0, 0x9d12, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000280)=0x3fb) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x104}, 0x40000) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x280000, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r3, 0x40084146, &(0x7f0000000140)=0x40) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 2821.214487][T31975] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2821.230404][T31975] EXT4-fs (loop4): group descriptors corrupted! [ 2821.295048][T31975] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2821.309487][T31975] EXT4-fs (loop4): group descriptors corrupted! 04:38:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(0x0, 0x1000000000016) 04:38:01 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x0, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:01 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 04:38:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b0000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c000000000000000000000000000000000000000000f512c6c42565776f00"/255], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:01 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x22, &(0x7f00000000c0), 0xc) 04:38:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2821.737019][T32002] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2821.755801][T32002] EXT4-fs (loop4): group descriptors corrupted! 04:38:01 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x81, &(0x7f0000002580)={[{@barrier='barrier'}]}) 04:38:01 executing program 3: syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)) 04:38:01 executing program 1: futex(&(0x7f0000000100)=0x1, 0x8d, 0x1, &(0x7f0000000140), 0x0, 0x0) [ 2821.838608][T32021] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2821.857745][T32021] EXT4-fs (loop4): group descriptors corrupted! 04:38:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 04:38:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) [ 2821.955040][T32021] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2821.978210][T32021] EXT4-fs (loop4): group descriptors corrupted! [ 2822.000931][T18219] usb 6-1: new high-speed USB device number 70 using dummy_hcd [ 2822.360528][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2822.371503][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2822.384471][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2822.393721][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2822.404997][T18219] usb 6-1: config 0 descriptor?? 04:38:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(0x0, 0x1000000000016) [ 2822.641672][T32003] udc-core: couldn't find an available UDC or it's busy [ 2822.648633][T32003] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2822.881182][T18219] keytouch 0003:0926:3333.009F: fixing up Keytouch IEC report descriptor [ 2822.900675][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.009F/input/input88 [ 2822.981522][T18219] keytouch 0003:0926:3333.009F: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2823.085125][ T1188] usb 6-1: USB disconnect, device number 70 04:38:03 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x0, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:03 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2823.890444][T32409] usb 6-1: new high-speed USB device number 71 using dummy_hcd [ 2824.320653][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2824.331603][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2824.347506][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2824.359645][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2824.371003][T32409] usb 6-1: config 0 descriptor?? [ 2824.621395][T32094] udc-core: couldn't find an available UDC or it's busy [ 2824.628355][T32094] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:38:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:04 executing program 1: socketpair(0x11, 0x2, 0x600, &(0x7f0000000000)) 04:38:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(0x0, 0x1000000000016) 04:38:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x22d2, 0x1, &(0x7f0000001580)=[{0x0}], 0x1008, &(0x7f0000001680)={[{@iocharset={'iocharset', 0x3d, 'cp950'}}]}) 04:38:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b00000500000000000000000000000000000031b6875300"/247], 0x0, 0xf7}, 0x20) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xcc, r2, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x3}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40}, 0x4000) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xffffffffffffff3f}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r3, 0x9d12, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r3, 0xc01864b0, &(0x7f0000000040)={0xb1, 0xffff7fff, 0x4, 0x1, 0x7f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:04 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4040, 0x0) 04:38:04 executing program 1: bpf$MAP_CREATE(0x7, &(0x7f0000000040), 0x40) 04:38:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000180)=""/128, 0x36, 0x80, 0x1}, 0x20) [ 2824.795091][T32114] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 04:38:04 executing program 1: futex(&(0x7f0000000100)=0x1, 0x8c, 0x1, 0x0, &(0x7f0000000180), 0x1) [ 2824.838603][T32114] EXT4-fs (loop4): group descriptors corrupted! [ 2824.852423][T32409] keytouch 0003:0926:3333.00A0: fixing up Keytouch IEC report descriptor [ 2824.874405][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00A0/input/input89 04:38:04 executing program 1: openat$dir(0xffffff9c, &(0x7f0000000180)='./file0\x00', 0x101a40, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1003400, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 2824.959576][T32114] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2824.974048][T32114] EXT4-fs (loop4): group descriptors corrupted! [ 2825.006941][T32409] keytouch 0003:0926:3333.00A0: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2825.047062][T32409] usb 6-1: USB disconnect, device number 71 04:38:05 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x0, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x81) 04:38:05 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r0, 0x1000000000016) 04:38:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000002) 04:38:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x5c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000280)) [ 2825.614049][T32192] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2825.651906][T32192] EXT4-fs (loop4): group descriptors corrupted! [ 2825.900474][T18219] usb 6-1: new high-speed USB device number 72 using dummy_hcd [ 2826.260654][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2826.272658][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2826.285397][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2826.296154][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2826.307268][T18219] usb 6-1: config 0 descriptor?? [ 2826.561317][T32198] udc-core: couldn't find an available UDC or it's busy [ 2826.568408][T32198] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2826.800765][T18219] keytouch 0003:0926:3333.00A1: fixing up Keytouch IEC report descriptor [ 2826.821848][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00A1/input/input90 [ 2826.902442][T18219] keytouch 0003:0926:3333.00A1: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2827.002567][T18219] usb 6-1: USB disconnect, device number 72 04:38:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) getsockopt(0xffffffffffffffff, 0x8c87, 0x9, &(0x7f0000000140)=""/230, &(0x7f0000000040)=0xe6) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xd4, 0x3, [@ptr={0x7}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0xfffffffe, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {0x4}, {}, {}, {0x0, 0x3}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xef}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:07 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 04:38:07 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r0, 0x1000000000016) 04:38:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:07 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:07 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r0, 0x1000000000016) 04:38:07 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2827.825229][T32257] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2827.841788][T32257] EXT4-fs (loop3): group descriptors corrupted! [ 2827.896950][T32261] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 04:38:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r2, 0x1, 0x3) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r1, r2, 0xc}, 0x10) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xc}, {0x8, 0x1}, {0x3}, {0xb}, {0x7, 0x3}]}, @ptr={0x7, 0x0, 0x0, 0x2, 0x4}, @enum={0x5, 0xa, 0x0, 0x6, 0x4, [{0xc}, {0x3}, {0x2, 0xffffffff}, {0xd, 0x100}, {0xb, 0x7}, {0x1, 0xffffffff}, {0x10, 0x6}, {0x0, 0x20000}, {0x9, 0x20}, {0x9, 0x4}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{0xf, 0x7}, {0x7, 0x40000000}, {0x4, 0x7}, {0xf, 0x8}, {0x0, 0x6fb}]}, @func={0x3, 0x0, 0x0, 0xc, 0x3}, @restrict={0x4, 0x0, 0x0, 0xb, 0x1}, @var={0x4, 0x0, 0x0, 0xe, 0x2, 0x1}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0xb}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x0]}}, &(0x7f0000000440)=""/210, 0x12f, 0xd2, 0x1}, 0x20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000900)={0x9}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000140)={0x9, {0x1, 0x8, 0x1ff, 0x101}, {0x1, 0x7fff, 0xffffffff, 0x9}, {0x8b95, 0x5}}) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2827.941790][T32261] EXT4-fs (loop4): group descriptors corrupted! 04:38:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2828.071637][T32293] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2828.083627][T32293] EXT4-fs (loop4): group descriptors corrupted! [ 2828.110387][ T1188] usb 6-1: new high-speed USB device number 73 using dummy_hcd [ 2828.158182][T32293] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2828.169618][T32293] EXT4-fs (loop4): group descriptors corrupted! [ 2828.190385][T18219] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 2828.480400][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2828.491440][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2828.501207][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2828.511864][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2828.522119][ T1188] usb 6-1: config 0 descriptor?? [ 2828.550575][T18219] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2828.564064][T18219] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2828.575304][T18219] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2828.584597][T18219] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2828.593561][T18219] usb 2-1: config 0 descriptor?? [ 2828.762347][T32262] udc-core: couldn't find an available UDC or it's busy [ 2828.769575][T32262] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2828.833909][T32281] udc-core: couldn't find an available UDC or it's busy [ 2828.841889][T32281] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2829.000875][ T1188] keytouch 0003:0926:3333.00A2: fixing up Keytouch IEC report descriptor [ 2829.016730][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00A2/input/input91 [ 2829.070889][T18219] keytouch 0003:0926:3333.00A3: fixing up Keytouch IEC report descriptor [ 2829.080265][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.00A3/input/input92 [ 2829.102211][ T1188] keytouch 0003:0926:3333.00A2: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2829.182104][T18219] keytouch 0003:0926:3333.00A3: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 2829.223354][T18219] usb 6-1: USB disconnect, device number 73 [ 2829.319334][ T1188] usb 2-1: USB disconnect, device number 24 04:38:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000600000d0000000000000000000000000000000004000006040000080000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b0000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000097fe00"/247], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 04:38:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6a01, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:10 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:10 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2830.927212][T32387] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2830.963324][T32387] EXT4-fs (loop4): group descriptors corrupted! 04:38:10 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x0, 0x0, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2831.029120][T32387] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2831.063711][T32387] EXT4-fs (loop4): group descriptors corrupted! 04:38:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2831.180322][T32409] usb 2-1: new high-speed USB device number 25 using dummy_hcd [ 2831.195750][T32425] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2831.206120][T22548] usb 6-1: new high-speed USB device number 74 using dummy_hcd [ 2831.219307][T32425] EXT4-fs (loop4): group descriptors corrupted! [ 2831.370322][T14617] usb 4-1: new high-speed USB device number 69 using dummy_hcd [ 2831.590358][T32409] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2831.601393][T32409] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2831.617684][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2831.628607][T32409] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2831.644001][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2831.656747][T32409] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2831.668022][T22548] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2831.680691][T22548] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2831.689102][T32409] usb 2-1: config 0 descriptor?? [ 2831.704731][T22548] usb 6-1: config 0 descriptor?? [ 2831.790342][T14617] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2831.801442][T14617] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2831.817511][T14617] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2831.829596][T14617] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2831.839756][T14617] usb 4-1: config 0 descriptor?? [ 2831.951464][T32390] udc-core: couldn't find an available UDC or it's busy [ 2831.952593][T32386] udc-core: couldn't find an available UDC or it's busy [ 2831.958447][T32390] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2831.974607][T32386] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2832.190786][T22548] keytouch 0003:0926:3333.00A4: fixing up Keytouch IEC report descriptor [ 2832.201965][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00A4/input/input93 [ 2832.216525][T32409] keytouch 0003:0926:3333.00A5: fixing up Keytouch IEC report descriptor [ 2832.226515][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.00A5/input/input94 [ 2832.311941][T14617] keytouch 0003:0926:3333.00A6: fixing up Keytouch IEC report descriptor [ 2832.320950][T22548] keytouch 0003:0926:3333.00A4: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2832.334345][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00A6/input/input95 [ 2832.393349][T32409] keytouch 0003:0926:3333.00A5: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 2832.433393][T32409] usb 2-1: USB disconnect, device number 25 [ 2832.439871][T22548] usb 6-1: USB disconnect, device number 74 [ 2832.463937][T14617] keytouch 0003:0926:3333.00A6: input,hidraw2: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2832.552110][T14617] usb 4-1: USB disconnect, device number 69 04:38:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000140)=""/142, 0x8e, 0x10002, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) r4 = getpgid(0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}, @IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x7fffffff}}]}]}]}, 0x40}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00'}) ptrace$setregs(0xf, r4, 0x10000000000005, &(0x7f0000000740)="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") ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6e01, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:13 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:13 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:13 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x0, 0x0, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) r2 = signalfd4(r1, &(0x7f0000000040)={[0xe608]}, 0x8, 0x800) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000140)=0xff) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2833.974025][T32565] A link change request failed with some changes committed already. Interface batadv_slave_1 may have been left with an inconsistent configuration, please check. [ 2833.991773][T32556] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2834.006327][T32556] EXT4-fs (loop4): group descriptors corrupted! [ 2834.069298][T32556] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2834.079443][T32556] EXT4-fs (loop4): group descriptors corrupted! 04:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6f01, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2834.159131][T32595] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2834.169493][T32595] EXT4-fs (loop4): group descriptors corrupted! 04:38:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2834.226124][T32595] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2834.236446][T22548] usb 4-1: new high-speed USB device number 70 using dummy_hcd [ 2834.244167][T14617] usb 2-1: new high-speed USB device number 26 using dummy_hcd [ 2834.251780][T32409] usb 6-1: new high-speed USB device number 75 using dummy_hcd [ 2834.261037][T32595] EXT4-fs (loop4): group descriptors corrupted! 04:38:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2834.376471][T32611] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2834.386934][T32611] EXT4-fs (loop4): group descriptors corrupted! [ 2834.442587][T32611] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2834.452924][T32611] EXT4-fs (loop4): group descriptors corrupted! [ 2834.620579][T22548] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2834.631668][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2834.642543][T14617] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2834.653604][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2834.670353][T14617] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2834.680082][T14617] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2834.689229][T22548] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2834.719039][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2834.728254][T22548] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2834.737348][T14617] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2834.745363][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2834.754548][T22548] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2834.763464][T14617] usb 2-1: config 0 descriptor?? [ 2834.773199][T32409] usb 6-1: config 0 descriptor?? [ 2834.779838][T22548] usb 4-1: config 0 descriptor?? [ 2835.002220][T32560] udc-core: couldn't find an available UDC or it's busy [ 2835.009216][T32560] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2835.011102][T32561] udc-core: couldn't find an available UDC or it's busy [ 2835.026122][T32561] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2835.240770][T14617] keytouch 0003:0926:3333.00A7: fixing up Keytouch IEC report descriptor [ 2835.253337][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.00A7/input/input96 [ 2835.270804][T32409] keytouch 0003:0926:3333.00A8: fixing up Keytouch IEC report descriptor [ 2835.279622][T22548] keytouch 0003:0926:3333.00A9: fixing up Keytouch IEC report descriptor [ 2835.296693][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00A8/input/input98 [ 2835.308486][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00A9/input/input97 [ 2835.331986][T14617] keytouch 0003:0926:3333.00A7: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 2835.405139][T32409] keytouch 0003:0926:3333.00A8: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2835.461694][T32409] usb 2-1: USB disconnect, device number 26 [ 2835.482372][T22548] keytouch 0003:0926:3333.00A9: input,hidraw2: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2835.562335][T22548] usb 4-1: USB disconnect, device number 70 [ 2835.598688][T14617] usb 6-1: USB disconnect, device number 75 04:38:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:15 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:15 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x0, 0x0, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2836.041254][T32741] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2836.055983][T32741] EXT4-fs (loop4): group descriptors corrupted! [ 2836.103131][T32741] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2836.113414][T32741] EXT4-fs (loop4): group descriptors corrupted! [ 2836.300257][T22548] usb 4-1: new high-speed USB device number 71 using dummy_hcd [ 2836.307866][T14617] usb 2-1: new high-speed USB device number 27 using dummy_hcd [ 2836.700281][T22548] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2836.711871][T22548] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2836.728128][T14617] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2836.739114][T22548] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2836.754496][T14617] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2836.767669][T22548] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2836.778444][T14617] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2836.790900][T14617] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2836.800730][T22548] usb 4-1: config 0 descriptor?? [ 2836.815763][T14617] usb 2-1: config 0 descriptor?? 04:38:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)=0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x400c, 0x2}, {0xe, 0x3}, {0xe, 0x3}, {0x8}, {0x9, 0x2003}, {0x3, 0x2}, {0x0, 0x5}, {0x10, 0x5}, {0x2, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {0x0, 0x2}, {}, {}, {0x2000000}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x11f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'veth0_virt_wifi\x00'}) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:16 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0x0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x9002, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2837.082674][T32744] udc-core: couldn't find an available UDC or it's busy [ 2837.093653][T32744] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2837.123665][ T302] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2837.136575][ T302] EXT4-fs (loop4): group descriptors corrupted! 04:38:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x9102, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2837.197324][ T302] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2837.207995][ T302] EXT4-fs (loop4): group descriptors corrupted! 04:38:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x9502, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2837.271086][T22548] keytouch 0003:0926:3333.00AA: fixing up Keytouch IEC report descriptor [ 2837.290343][ T323] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2837.294989][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00AA/input/input99 [ 2837.300757][ T323] EXT4-fs (loop4): group descriptors corrupted! [ 2837.355020][T14617] keytouch 0003:0926:3333.00AB: fixing up Keytouch IEC report descriptor [ 2837.381499][T14619] usb 6-1: new high-speed USB device number 76 using dummy_hcd [ 2837.402449][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.00AB/input/input100 [ 2837.422065][T22548] keytouch 0003:0926:3333.00AA: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2837.465943][ T341] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2837.476438][ T341] EXT4-fs (loop4): group descriptors corrupted! [ 2837.502889][T14617] keytouch 0003:0926:3333.00AB: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 2837.503023][ T1188] usb 4-1: USB disconnect, device number 71 04:38:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2837.615400][T14617] usb 2-1: USB disconnect, device number 27 [ 2837.662345][ T399] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2837.672610][ T399] EXT4-fs (loop4): group descriptors corrupted! [ 2837.716679][ T399] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2837.728235][ T399] EXT4-fs (loop4): group descriptors corrupted! [ 2837.743511][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2837.754597][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:38:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2837.764645][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2837.774194][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2837.783033][T14619] usb 6-1: config 0 descriptor?? [ 2837.861310][ T411] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2837.871563][ T411] EXT4-fs (loop4): group descriptors corrupted! 04:38:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2837.916233][ T411] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2837.926568][ T411] EXT4-fs (loop4): group descriptors corrupted! 04:38:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x20000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2838.018864][ T421] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2838.030037][ T303] udc-core: couldn't find an available UDC or it's busy [ 2838.037212][ T303] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2838.037995][ T421] EXT4-fs (loop4): group descriptors corrupted! [ 2838.163117][ T427] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2838.173395][ T427] EXT4-fs (loop4): group descriptors corrupted! [ 2838.280756][T14619] keytouch 0003:0926:3333.00AC: fixing up Keytouch IEC report descriptor [ 2838.290953][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00AC/input/input101 [ 2838.371578][T14619] keytouch 0003:0926:3333.00AC: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2838.490293][ T1188] usb 6-1: USB disconnect, device number 76 04:38:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:18 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:18 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x0, 0x0, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2839.330267][T14617] usb 2-1: new high-speed USB device number 28 using dummy_hcd [ 2839.338109][T14619] usb 4-1: new high-speed USB device number 72 using dummy_hcd [ 2839.720732][T14617] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2839.731858][T14619] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2839.742727][T14617] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2839.752528][T14619] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2839.763492][T14617] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2839.772842][T14619] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2839.781941][T14617] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2839.789907][T14619] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2839.799350][T14617] usb 2-1: config 0 descriptor?? [ 2839.806099][T14619] usb 4-1: config 0 descriptor?? [ 2840.054266][ T469] udc-core: couldn't find an available UDC or it's busy [ 2840.061412][ T469] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:38:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/28) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:19 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0x0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x80000) ioctl$SNDCTL_FM_LOAD_INSTR(r0, 0x40285107) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)="e8c8aaeb582adbe9a0eb9446eabfcbf69c") ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2840.152602][ T488] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2840.164457][ T488] EXT4-fs (loop4): group descriptors corrupted! 04:38:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2840.231737][ T488] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2840.251943][ T488] EXT4-fs (loop4): group descriptors corrupted! [ 2840.290635][T14619] keytouch 0003:0926:3333.00AD: fixing up Keytouch IEC report descriptor [ 2840.300050][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00AD/input/input102 [ 2840.312019][T14617] keytouch 0003:0926:3333.00AE: fixing up Keytouch IEC report descriptor [ 2840.322632][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.00AE/input/input103 04:38:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x80040, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2840.346031][ T515] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2840.356248][ T515] EXT4-fs (loop4): group descriptors corrupted! 04:38:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2840.401749][T14619] keytouch 0003:0926:3333.00AD: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2840.413966][T32409] usb 6-1: new high-speed USB device number 77 using dummy_hcd [ 2840.472997][T14617] keytouch 0003:0926:3333.00AE: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 04:38:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfc0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2840.519129][ T1188] usb 2-1: USB disconnect, device number 28 [ 2840.525596][T18219] usb 4-1: USB disconnect, device number 72 [ 2840.540437][ T533] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2840.552832][ T533] EXT4-fs (loop4): group descriptors corrupted! [ 2840.661435][ T591] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2840.756301][ T591] EXT4-fs (loop4): group descriptors corrupted! 04:38:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2840.841698][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2840.853596][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2840.872946][ T597] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2840.886833][ T597] EXT4-fs (loop4): group descriptors corrupted! [ 2840.890962][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2840.913907][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2840.925576][T32409] usb 6-1: config 0 descriptor?? [ 2841.182559][ T487] udc-core: couldn't find an available UDC or it's busy [ 2841.189651][ T487] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2841.420693][T32409] keytouch 0003:0926:3333.00AF: fixing up Keytouch IEC report descriptor [ 2841.430078][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00AF/input/input104 [ 2841.522015][T32409] keytouch 0003:0926:3333.00AF: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2841.626149][T18219] usb 6-1: USB disconnect, device number 77 04:38:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:21 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:21 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x0, 0x0, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:21 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0x0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2842.100337][ T649] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2842.117093][ T649] EXT4-fs (loop4): group descriptors corrupted! 04:38:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2842.179324][ T649] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2842.189908][ T649] EXT4-fs (loop4): group descriptors corrupted! [ 2842.274160][ T671] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2842.285094][ T671] EXT4-fs (loop4): group descriptors corrupted! [ 2842.350189][T18219] usb 4-1: new high-speed USB device number 73 using dummy_hcd [ 2842.364615][ T671] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2842.375175][ T671] EXT4-fs (loop4): group descriptors corrupted! [ 2842.380144][T32409] usb 2-1: new high-speed USB device number 29 using dummy_hcd [ 2842.460204][T14619] usb 6-1: new high-speed USB device number 78 using dummy_hcd [ 2842.710527][T18219] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2842.723108][T18219] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2842.732916][T18219] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2842.743830][T18219] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2842.750344][T32409] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2842.753834][T18219] usb 4-1: config 0 descriptor?? [ 2842.773063][T32409] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2842.788686][T32409] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2842.800591][T32409] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2842.809748][T32409] usb 2-1: config 0 descriptor?? [ 2842.850745][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2842.864700][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2842.880762][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2842.889843][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2842.901673][T14619] usb 6-1: config 0 descriptor?? [ 2843.064043][ T652] udc-core: couldn't find an available UDC or it's busy [ 2843.071132][ T652] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2843.140985][ T667] udc-core: couldn't find an available UDC or it's busy [ 2843.148095][ T667] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:38:22 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000ffc000/0x3000)=nil) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair(0x1f, 0x7, 0xffff, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000200), 0x4) bind$llc(r2, &(0x7f00000001c0)={0x1a, 0x201, 0x8, 0x0, 0x1, 0x1}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @fwd={0x5}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {0x10}, {}, {}, {}, {}, {0x100}, {0xc}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xd7}, 0x20) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000140)=0x100924680) getpgid(r0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setopts(0x4200, r0, 0xb497, 0x8) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2843.260678][T18219] keytouch 0003:0926:3333.00B0: fixing up Keytouch IEC report descriptor [ 2843.282459][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00B0/input/input105 [ 2843.298543][ T703] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2843.309459][T32409] keytouch 0003:0926:3333.00B1: fixing up Keytouch IEC report descriptor [ 2843.325785][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.00B1/input/input106 [ 2843.347945][ T703] EXT4-fs (loop4): group descriptors corrupted! 04:38:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2843.361967][T18219] keytouch 0003:0926:3333.00B0: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2843.380528][T14619] keytouch 0003:0926:3333.00B2: fixing up Keytouch IEC report descriptor [ 2843.389814][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00B2/input/input107 04:38:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_io_uring_complete(0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000140)={0x0, 0xc, 0x0, 0x80, 0x0, [@local, @mcast1, @empty, @loopback, @local, @local]}, 0x68) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, &(0x7f0000000040)={{@any, 0x9}, 0x9da, 0xee8, 0x7fff, 0x6}) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) sync_file_range(r0, 0x2, 0x5, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0xffff7fff, @empty, 0x8001}}, 0x8, 0x2f, 0x2, 0x0, 0x9}, &(0x7f00000002c0)=0x98) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000001c0)=0x4) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2843.478129][T18219] usb 4-1: USB disconnect, device number 73 [ 2843.503084][T32409] keytouch 0003:0926:3333.00B1: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 2843.529959][T32409] usb 2-1: USB disconnect, device number 29 [ 2843.541371][T22548] keytouch 0003:0926:3333.00B1: usb_submit_urb(ctrl) failed: -19 [ 2843.578447][ T743] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2843.595476][T14619] keytouch 0003:0926:3333.00B2: input,hidraw2: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2843.609298][T14619] usb 6-1: USB disconnect, device number 78 [ 2843.647136][ T743] EXT4-fs (loop4): group descriptors corrupted! 04:38:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2843.696927][ T743] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2843.708227][ T743] EXT4-fs (loop4): group descriptors corrupted! 04:38:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/28) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2843.962736][ T825] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2843.974654][ T825] EXT4-fs (loop4): group descriptors corrupted! 04:38:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)=0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x400c, 0x2}, {0xe, 0x3}, {0xe, 0x3}, {0x8}, {0x9, 0x2003}, {0x3, 0x2}, {0x0, 0x5}, {0x10, 0x5}, {0x2, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {0x0, 0x2}, {}, {}, {0x2000000}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x11f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$sock_qrtr_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'veth0_virt_wifi\x00'}) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:24 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2845.125735][ T845] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2845.136269][ T845] EXT4-fs (loop4): group descriptors corrupted! 04:38:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2845.225228][ T853] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2845.235449][ T853] EXT4-fs (loop4): group descriptors corrupted! 04:38:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2845.295577][ T858] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2845.305891][ T858] EXT4-fs (loop4): group descriptors corrupted! [ 2845.378286][ T864] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2845.388611][ T864] EXT4-fs (loop4): group descriptors corrupted! [ 2845.390124][T32409] usb 6-1: new high-speed USB device number 79 using dummy_hcd [ 2845.453435][ T864] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2845.470301][ T864] EXT4-fs (loop4): group descriptors corrupted! 04:38:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xa000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2845.566026][ T874] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2845.576395][ T874] EXT4-fs (loop4): group descriptors corrupted! [ 2845.780159][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2845.791372][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2845.801212][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2845.810925][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2845.821675][T32409] usb 6-1: config 0 descriptor?? [ 2846.061215][ T843] udc-core: couldn't find an available UDC or it's busy [ 2846.068171][ T843] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2846.310689][T32409] keytouch 0003:0926:3333.00B3: fixing up Keytouch IEC report descriptor [ 2846.323301][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00B3/input/input108 [ 2846.412810][T32409] keytouch 0003:0926:3333.00B3: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2846.513368][T32409] usb 6-1: USB disconnect, device number 79 04:38:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r1, 0xc01064c8, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2846.601033][ T918] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2846.614722][ T918] EXT4-fs (loop4): group descriptors corrupted! [ 2846.672629][ T918] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2846.690332][ T918] EXT4-fs (loop4): group descriptors corrupted! 04:38:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xc000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2846.784627][ T935] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2846.794878][ T935] EXT4-fs (loop4): group descriptors corrupted! 04:38:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xd000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:26 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0x0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2847.109615][ T943] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2847.120001][ T943] EXT4-fs (loop4): group descriptors corrupted! [ 2847.181202][ T943] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2847.191544][ T943] EXT4-fs (loop4): group descriptors corrupted! [ 2847.400183][T14619] usb 2-1: new high-speed USB device number 30 using dummy_hcd [ 2847.770120][T14619] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2847.781164][T14619] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2847.795926][T14619] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2847.806310][T14619] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2847.817562][T14619] usb 2-1: config 0 descriptor?? 04:38:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:27 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:27 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xe000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2848.084462][ T947] udc-core: couldn't find an available UDC or it's busy [ 2848.091501][ T947] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:38:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xf000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2848.151604][ T964] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2848.164785][ T964] EXT4-fs (loop4): group descriptors corrupted! [ 2848.259132][ T979] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2848.269450][ T979] EXT4-fs (loop4): group descriptors corrupted! 04:38:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x10000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2848.318463][ T979] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2848.328745][ T979] EXT4-fs (loop4): group descriptors corrupted! [ 2848.339757][T14619] keytouch 0003:0926:3333.00B4: fixing up Keytouch IEC report descriptor [ 2848.350406][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.00B4/input/input109 [ 2848.416744][ T991] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2848.421971][T18219] usb 4-1: new high-speed USB device number 74 using dummy_hcd [ 2848.427005][ T991] EXT4-fs (loop4): group descriptors corrupted! [ 2848.434505][ T1188] usb 6-1: new high-speed USB device number 80 using dummy_hcd [ 2848.449561][T14619] keytouch 0003:0926:3333.00B4: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 04:38:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x10040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2848.575752][ T1189] usb 2-1: USB disconnect, device number 30 04:38:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2848.657603][ T1027] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2848.671380][ T1027] EXT4-fs (loop4): group descriptors corrupted! [ 2848.759588][ T1033] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2848.769992][ T1033] EXT4-fs (loop4): group descriptors corrupted! [ 2848.790223][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2848.807921][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2848.819489][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2848.830184][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2848.839057][ T1188] usb 6-1: config 0 descriptor?? [ 2848.850098][T18219] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2848.867069][T18219] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2848.877031][T18219] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2848.889936][T18219] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2848.899253][T18219] usb 4-1: config 0 descriptor?? [ 2849.087138][ T967] udc-core: couldn't find an available UDC or it's busy [ 2849.094148][ T967] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2849.143783][ T965] udc-core: couldn't find an available UDC or it's busy [ 2849.150789][ T965] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2849.340549][ T1188] keytouch 0003:0926:3333.00B5: fixing up Keytouch IEC report descriptor [ 2849.361654][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00B5/input/input110 [ 2849.400542][T18219] keytouch 0003:0926:3333.00B6: fixing up Keytouch IEC report descriptor [ 2849.418469][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00B6/input/input111 [ 2849.444629][ T1188] keytouch 0003:0926:3333.00B5: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2849.513139][T18219] keytouch 0003:0926:3333.00B6: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2849.553181][T14619] usb 6-1: USB disconnect, device number 80 04:38:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getegid() r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x12000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:29 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0x0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2849.660418][T32409] usb 4-1: USB disconnect, device number 74 [ 2849.689392][ T1103] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2849.706042][ T1103] EXT4-fs (loop4): group descriptors corrupted! [ 2849.770811][ T1103] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2849.786107][ T1103] EXT4-fs (loop4): group descriptors corrupted! [ 2849.980076][T18219] usb 2-1: new high-speed USB device number 31 using dummy_hcd [ 2850.340093][T18219] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2850.351035][T18219] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2850.364010][T18219] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2850.373257][T18219] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2850.385008][T18219] usb 2-1: config 0 descriptor?? [ 2850.632295][ T1123] udc-core: couldn't find an available UDC or it's busy [ 2850.639288][ T1123] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2850.870479][T18219] keytouch 0003:0926:3333.00B7: fixing up Keytouch IEC report descriptor [ 2850.888839][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.00B7/input/input112 [ 2850.972244][T18219] keytouch 0003:0926:3333.00B7: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 2851.084691][T14619] usb 2-1: USB disconnect, device number 31 04:38:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x14000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:30 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:30 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2851.193915][ T1184] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2851.212419][ T1184] EXT4-fs (loop4): group descriptors corrupted! 04:38:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x20100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2851.324683][ T1201] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2851.334995][ T1201] EXT4-fs (loop4): group descriptors corrupted! [ 2851.426757][ T1207] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2851.437208][ T1207] EXT4-fs (loop4): group descriptors corrupted! [ 2851.452201][T18219] usb 4-1: new high-speed USB device number 75 using dummy_hcd [ 2851.480076][T22548] usb 6-1: new high-speed USB device number 81 using dummy_hcd [ 2851.494330][ T1207] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2851.505383][ T1207] EXT4-fs (loop4): group descriptors corrupted! 04:38:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x25000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x9d12, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0x58, 0x8, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 2851.641212][ T1221] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2851.652856][ T1221] EXT4-fs (loop4): group descriptors corrupted! [ 2851.810431][T18219] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2851.821520][T18219] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2851.837950][T18219] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2851.850197][T18219] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2851.858799][T18219] usb 4-1: config 0 descriptor?? [ 2851.870243][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2851.887116][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2851.897528][T22548] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2851.907659][T22548] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2851.916678][T22548] usb 6-1: config 0 descriptor?? [ 2852.124073][ T1185] udc-core: couldn't find an available UDC or it's busy [ 2852.131040][ T1185] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2852.160951][ T1193] udc-core: couldn't find an available UDC or it's busy [ 2852.167973][ T1193] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2852.380465][T18219] keytouch 0003:0926:3333.00B8: fixing up Keytouch IEC report descriptor [ 2852.391739][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00B8/input/input113 [ 2852.401555][T22548] keytouch 0003:0926:3333.00B9: fixing up Keytouch IEC report descriptor [ 2852.430033][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00B9/input/input114 [ 2852.472018][T18219] keytouch 0003:0926:3333.00B8: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2852.552103][T22548] keytouch 0003:0926:3333.00B9: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2852.605044][T22548] usb 6-1: USB disconnect, device number 81 [ 2852.636741][T18219] usb 4-1: USB disconnect, device number 75 04:38:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b0000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/247], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) getpid() 04:38:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2e000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2852.708293][ T1303] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2852.718529][ T1303] EXT4-fs (loop4): group descriptors corrupted! 04:38:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2852.788320][ T1303] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2852.802351][ T1303] EXT4-fs (loop4): group descriptors corrupted! [ 2852.899273][ T1317] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2852.909482][ T1317] EXT4-fs (loop4): group descriptors corrupted! 04:38:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2852.966063][ T1317] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2852.978000][ T1317] EXT4-fs (loop4): group descriptors corrupted! [ 2853.064836][ T1327] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2853.076381][ T1327] EXT4-fs (loop4): group descriptors corrupted! 04:38:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x40000800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:33 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:33 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x46000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2854.220421][ T1336] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2854.232103][ T1336] EXT4-fs (loop4): group descriptors corrupted! 04:38:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2854.353698][ T1349] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2854.364130][ T1349] EXT4-fs (loop4): group descriptors corrupted! [ 2854.453959][ T1359] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2854.464235][ T1359] EXT4-fs (loop4): group descriptors corrupted! [ 2854.510012][T22548] usb 4-1: new high-speed USB device number 76 using dummy_hcd [ 2854.517874][T14619] usb 6-1: new high-speed USB device number 82 using dummy_hcd 04:38:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x9d12, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0x58, 0x8, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 2854.870139][T22548] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2854.881172][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2854.892022][T22548] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2854.901831][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2854.912129][T22548] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2854.921511][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2854.930561][T22548] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2854.938834][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2854.947236][T22548] usb 4-1: config 0 descriptor?? [ 2854.954812][T14619] usb 6-1: config 0 descriptor?? [ 2855.191462][ T1341] udc-core: couldn't find an available UDC or it's busy [ 2855.195608][ T1340] udc-core: couldn't find an available UDC or it's busy [ 2855.198562][ T1341] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2855.205450][ T1340] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2855.440499][T14619] keytouch 0003:0926:3333.00BA: fixing up Keytouch IEC report descriptor [ 2855.451441][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00BA/input/input115 [ 2855.464639][T22548] keytouch 0003:0926:3333.00BB: fixing up Keytouch IEC report descriptor [ 2855.474869][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00BB/input/input116 [ 2855.551809][T14619] keytouch 0003:0926:3333.00BA: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2855.623449][T22548] keytouch 0003:0926:3333.00BB: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2855.665420][T22548] usb 4-1: USB disconnect, device number 76 [ 2855.691702][T14619] usb 6-1: USB disconnect, device number 82 04:38:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0xf7}, 0x20) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000003c80)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003b80)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000040)=""/26, 0x1a}], 0x1, &(0x7f0000000480)=""/4096, 0x1000}, 0xfff}, {{&(0x7f0000001480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001500), 0x0, &(0x7f0000001540)=""/4096, 0x1000}, 0x100}, {{&(0x7f0000002540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f00000025c0)=""/170, 0xaa}, {&(0x7f0000002680)=""/17, 0x11}], 0x2, &(0x7f0000002700)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000003700)=@alg, 0x80, &(0x7f0000003a00)=[{&(0x7f0000003780)=""/53, 0x35}, {&(0x7f00000037c0)=""/95, 0x5f}, {&(0x7f0000003840)=""/172, 0xac}, {&(0x7f0000003900)=""/180, 0xb4}, {&(0x7f00000039c0)=""/55, 0x37}], 0x5, &(0x7f0000003a80)=""/225, 0xe1}, 0x4}], 0x4, 0x142, &(0x7f0000003cc0)={r2, r3+10000000}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r4, 0x9d12, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vxcan1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'syztnl1\x00', r5, 0x8, 0x10, 0x0, 0xb9f, {{0x15, 0x4, 0x0, 0x3f, 0x54, 0x65, 0x0, 0x0, 0x2f, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x37}, {[@ssrr={0x89, 0xb, 0x47, [@dev={0xac, 0x14, 0x14, 0x3e}, @rand_addr=0x64010100]}, @timestamp_prespec={0x44, 0x24, 0x82, 0x3, 0x7, [{@broadcast, 0x200}, {@broadcast}, {@broadcast, 0x2}, {@loopback, 0x1ff}]}, @lsrr={0x83, 0xf, 0x82, [@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end]}}}}}) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2855.803951][ T1445] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2855.815632][ T1445] EXT4-fs (loop4): group descriptors corrupted! 04:38:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x5c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2855.880589][ T1445] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2855.896198][ T1445] EXT4-fs (loop4): group descriptors corrupted! 04:38:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2855.991549][ T1461] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2856.001718][ T1461] EXT4-fs (loop4): group descriptors corrupted! 04:38:35 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:35 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x0, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x60000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2856.224439][ T1478] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2856.234699][ T1478] EXT4-fs (loop4): group descriptors corrupted! 04:38:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2856.309083][ T1478] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2856.332630][ T1478] EXT4-fs (loop4): group descriptors corrupted! [ 2856.459982][T18219] usb 6-1: new high-speed USB device number 83 using dummy_hcd [ 2856.509989][T22548] usb 4-1: new high-speed USB device number 77 using dummy_hcd [ 2856.820001][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2856.830942][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2856.840746][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2856.851186][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2856.861579][T18219] usb 6-1: config 0 descriptor?? [ 2856.889989][T22548] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2856.904380][T22548] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2856.920428][T22548] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2856.929556][T22548] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2856.940745][T22548] usb 4-1: config 0 descriptor?? [ 2857.100854][ T1472] udc-core: couldn't find an available UDC or it's busy [ 2857.107897][ T1472] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2857.194213][ T1484] udc-core: couldn't find an available UDC or it's busy [ 2857.201188][ T1484] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2857.340408][T18219] keytouch 0003:0926:3333.00BC: fixing up Keytouch IEC report descriptor [ 2857.358597][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00BC/input/input117 [ 2857.441516][T18219] keytouch 0003:0926:3333.00BC: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2857.451734][T22548] keytouch 0003:0926:3333.00BD: fixing up Keytouch IEC report descriptor [ 2857.484531][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00BD/input/input118 [ 2857.543521][T18219] usb 6-1: USB disconnect, device number 83 [ 2857.591352][T22548] keytouch 0003:0926:3333.00BD: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 04:38:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x9d12, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0x58, 0x8, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x1) 04:38:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x68000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2857.702297][T22548] usb 4-1: USB disconnect, device number 77 [ 2857.753210][ T1577] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2857.766491][ T1577] EXT4-fs (loop4): group descriptors corrupted! 04:38:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) 04:38:38 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x60000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6a010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2858.837868][ T1593] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2858.850029][ T1593] EXT4-fs (loop4): group descriptors corrupted! [ 2858.856496][ T1594] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2858.874059][ T1594] EXT4-fs (loop3): group descriptors corrupted! 04:38:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2858.905427][ T1593] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2858.917637][ T1593] EXT4-fs (loop4): group descriptors corrupted! 04:38:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2859.043697][ T1625] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2859.059587][ T1624] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2859.073540][ T1625] EXT4-fs (loop3): group descriptors corrupted! 04:38:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:38 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2859.093769][ T1624] EXT4-fs (loop4): group descriptors corrupted! [ 2859.111331][T14619] usb 6-1: new high-speed USB device number 84 using dummy_hcd [ 2859.192321][ T1624] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2859.208045][ T1624] EXT4-fs (loop4): group descriptors corrupted! [ 2859.480139][ T1188] usb 4-1: new high-speed USB device number 78 using dummy_hcd [ 2859.480231][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2859.500038][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2859.509937][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2859.519057][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2859.533678][T14619] usb 6-1: config 0 descriptor?? [ 2859.783134][ T1596] udc-core: couldn't find an available UDC or it's busy [ 2859.790339][ T1596] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2859.839963][ T1188] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2859.851324][ T1188] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2859.862694][ T1188] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2859.872536][ T1188] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2859.881213][ T1188] usb 4-1: config 0 descriptor?? [ 2860.010518][T14619] keytouch 0003:0926:3333.00BE: fixing up Keytouch IEC report descriptor [ 2860.028660][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00BE/input/input119 [ 2860.124406][ T1640] udc-core: couldn't find an available UDC or it's busy [ 2860.131954][ T1640] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2860.132635][T14619] keytouch 0003:0926:3333.00BE: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2860.224107][T14619] usb 6-1: USB disconnect, device number 84 [ 2860.380385][ T1188] keytouch 0003:0926:3333.00BF: fixing up Keytouch IEC report descriptor [ 2860.391596][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00BF/input/input120 [ 2860.473000][ T1188] keytouch 0003:0926:3333.00BF: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2860.590102][T18219] usb 4-1: USB disconnect, device number 78 04:38:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x9d12, 0x0) 04:38:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6e010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2860.756567][ T1740] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2860.782447][ T1740] EXT4-fs (loop4): group descriptors corrupted! [ 2860.847411][ T1740] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2860.857825][ T1740] EXT4-fs (loop4): group descriptors corrupted! 04:38:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:41 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x0, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6f010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:41 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2861.868957][ T1761] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2861.879602][ T1761] EXT4-fs (loop4): group descriptors corrupted! 04:38:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x74000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2861.959603][ T1761] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2861.982548][ T1761] EXT4-fs (loop4): group descriptors corrupted! 04:38:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2862.069640][ T1785] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2862.081664][ T1785] EXT4-fs (loop4): group descriptors corrupted! 04:38:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x781e70c8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2862.129938][T18219] usb 6-1: new high-speed USB device number 85 using dummy_hcd [ 2862.151151][ T1785] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2862.161871][ T1785] EXT4-fs (loop4): group descriptors corrupted! [ 2862.169921][T14619] usb 4-1: new high-speed USB device number 79 using dummy_hcd [ 2862.238186][ T1797] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2862.250536][ T1797] EXT4-fs (loop4): group descriptors corrupted! 04:38:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x7a000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2862.310861][ T1797] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2862.321052][ T1797] EXT4-fs (loop4): group descriptors corrupted! 04:38:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2862.397514][ T1807] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2862.408105][ T1807] EXT4-fs (loop4): group descriptors corrupted! [ 2862.481558][ T1812] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2862.493361][ T1812] EXT4-fs (loop4): group descriptors corrupted! [ 2862.510266][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2862.521413][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:38:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x90020000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2862.531626][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2862.541206][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2862.560348][T18219] usb 6-1: config 0 descriptor?? [ 2862.569907][T14619] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2862.587460][T14619] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2862.606432][T14619] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2862.618174][T14619] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2862.632975][T14619] usb 4-1: config 0 descriptor?? [ 2862.638888][ T1818] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2862.655123][ T1818] EXT4-fs (loop4): group descriptors corrupted! [ 2862.815037][ T1760] udc-core: couldn't find an available UDC or it's busy [ 2862.823995][ T1760] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2862.875461][ T1766] udc-core: couldn't find an available UDC or it's busy [ 2862.882488][ T1766] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2863.070383][T18219] keytouch 0003:0926:3333.00C0: fixing up Keytouch IEC report descriptor [ 2863.081800][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00C0/input/input121 [ 2863.140440][T14619] keytouch 0003:0926:3333.00C1: fixing up Keytouch IEC report descriptor [ 2863.158517][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00C1/input/input122 [ 2863.172183][T18219] keytouch 0003:0926:3333.00C0: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2863.242236][T14619] keytouch 0003:0926:3333.00C1: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2863.288566][T14619] usb 6-1: USB disconnect, device number 85 [ 2863.366771][T18219] usb 4-1: USB disconnect, device number 79 04:38:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x91020000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2863.756421][ T1899] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2863.771038][ T1899] EXT4-fs (loop4): group descriptors corrupted! 04:38:44 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x0, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x95020000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb000018000000a858d2583500000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000004000000000000000000b00000000000000000b000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"/252], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) tkill(r0, 0x40) ptrace$setregs(0xf, 0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') r2 = syz_open_dev$vcsu(&(0x7f00000002c0)='/dev/vcsu#\x00', 0x0, 0x10000) ioctl$DRM_IOCTL_MODE_CURSOR2(r2, 0xc02464bb, &(0x7f0000000300)={0x0, 0x7, 0x72, 0x1, 0x800, 0x1, 0x9, 0x5, 0x3}) lseek(r1, 0x9d12, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000040)=0xf707) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:44 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0, 0xf7}, 0x20) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000140)) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000001c0)={0x4a, 0x6f, 0x2, {0x5, [{0x20, 0x2, 0x7}, {0x40, 0x1}, {0x8, 0x0, 0x7}, {0x10, 0x2}, {0x2, 0x0, 0x8}]}}, 0x4a) [ 2864.884875][ T1912] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2864.897173][ T1912] EXT4-fs (loop4): group descriptors corrupted! [ 2864.975731][ T1912] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2864.995931][ T1912] EXT4-fs (loop4): group descriptors corrupted! 04:38:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x97ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2865.149837][ T1189] usb 6-1: new high-speed USB device number 86 using dummy_hcd [ 2865.157837][T18219] usb 4-1: new high-speed USB device number 80 using dummy_hcd [ 2865.183593][ T1949] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 04:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xc0ed0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2865.195758][ T1949] EXT4-fs (loop4): group descriptors corrupted! [ 2865.273403][ T1956] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2865.283827][ T1956] EXT4-fs (loop4): group descriptors corrupted! 04:38:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xc8701e78, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2865.335789][ T1956] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2865.346328][ T1956] EXT4-fs (loop4): group descriptors corrupted! 04:38:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2865.446938][ T1965] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2865.459313][ T1965] EXT4-fs (loop4): group descriptors corrupted! [ 2865.529938][ T1189] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2865.541332][T18219] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2865.552979][ T1189] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2865.579225][T18219] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2865.601720][ T1971] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2865.612350][T18219] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2865.626336][ T1189] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2865.643582][ T1971] EXT4-fs (loop4): group descriptors corrupted! [ 2865.653843][T18219] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2865.663807][ T1189] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2865.683237][T18219] usb 4-1: config 0 descriptor?? [ 2865.699144][ T1189] usb 6-1: config 0 descriptor?? [ 2865.943670][ T1917] udc-core: couldn't find an available UDC or it's busy [ 2865.944049][ T1918] udc-core: couldn't find an available UDC or it's busy [ 2865.952798][ T1917] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2865.958321][ T1918] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2866.220346][T18219] keytouch 0003:0926:3333.00C2: fixing up Keytouch IEC report descriptor [ 2866.230337][ T1189] keytouch 0003:0926:3333.00C3: fixing up Keytouch IEC report descriptor [ 2866.247550][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0926:3333.00C2/input/input123 [ 2866.259342][ T1189] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00C3/input/input124 [ 2866.351225][ T1189] keytouch 0003:0926:3333.00C3: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2866.423193][T22548] usb 6-1: USB disconnect, device number 86 [ 2866.424575][T18219] keytouch 0003:0926:3333.00C2: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.3-1/input0 [ 2866.502047][T18219] usb 4-1: USB disconnect, device number 80 04:38:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xf9fdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2866.770380][ T2057] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2866.780659][ T2057] EXT4-fs (loop4): group descriptors corrupted! 04:38:46 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x0, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfbffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2866.963471][ T2066] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2866.989017][ T2066] EXT4-fs (loop4): group descriptors corrupted! 04:38:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2867.143560][ T2081] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2867.154220][ T2081] EXT4-fs (loop4): group descriptors corrupted! [ 2867.269838][T22548] usb 6-1: new high-speed USB device number 87 using dummy_hcd [ 2867.699896][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2867.711650][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2867.725574][T22548] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2867.734722][T22548] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2867.745062][T22548] usb 6-1: config 0 descriptor?? 04:38:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000dc0000000400000003000000000000000100000d000000000000000000000000000000000400000604000000000000d10000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b00001000000000000000000000000000000000000000000000fe1c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000890100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000003fa0a35cf45642a7d2fc1de30eff03ba543a2ee57825eb8783bff5bb26508e61ffd11c5c1fc835ea83b3a61a09c5b5b4a2be73823297337dcbc677513611e7491e23153cdba2d6be6861e61a9b0fe66bb7f827e685aabdaf0aff52947cc9b27ec8dd4ca9d6f5f976a7bed28e53bd89b1345510acc790c496f4f23205451cf8338f21561b90883949fb1e460fc9c3e9791a0e00c6214c6c3afcec42b1d96d345d71fa16a617c85c3ed5ca787a53251f33edd7e56c8146ff89f6eeb8e63def022c6cb1d1aa3f8dcfc0239b95c4f482190b46d2526668b6a64f5700a0988a5714d87b2e0dcb98686e19fd8ca8cc90fafe3d"], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r1, 0x942e, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2867.990683][ T2070] udc-core: couldn't find an available UDC or it's busy [ 2867.997896][ T2070] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:38:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) 04:38:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfdffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2868.176280][ T2101] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2868.186599][ T2101] EXT4-fs (loop4): group descriptors corrupted! [ 2868.250267][T22548] keytouch 0003:0926:3333.00C4: fixing up Keytouch IEC report descriptor [ 2868.268066][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00C4/input/input125 [ 2868.293942][ T2110] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2868.304428][ T2110] EXT4-fs (loop4): group descriptors corrupted! [ 2868.361118][T22548] keytouch 0003:0926:3333.00C4: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 04:38:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2868.465540][ T1189] usb 6-1: USB disconnect, device number 87 04:38:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffbffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2868.523553][ T2136] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2868.544369][ T2136] EXT4-fs (loop4): group descriptors corrupted! 04:38:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffbff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:49 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x0, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2869.809795][ T2165] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2869.836162][ T2165] EXT4-fs (loop4): group descriptors corrupted! 04:38:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffdf9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2870.072394][ T2182] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2870.083374][ T2182] EXT4-fs (loop4): group descriptors corrupted! [ 2870.092874][T32409] usb 6-1: new high-speed USB device number 88 using dummy_hcd [ 2870.137200][ T2182] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2870.161247][ T2182] EXT4-fs (loop4): group descriptors corrupted! [ 2870.519946][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2870.532047][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2870.548167][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2870.560162][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2870.576119][T32409] usb 6-1: config 0 descriptor?? [ 2870.830721][ T2167] udc-core: couldn't find an available UDC or it's busy [ 2870.837734][ T2167] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:38:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b00000500000000000000006cb4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009493cb81d8cc8eaecddcc00000400"/247], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000140)=0x4) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x1000000000016) [ 2871.022928][ T2220] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2871.033371][ T2220] EXT4-fs (loop4): group descriptors corrupted! 04:38:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2871.070634][T32409] keytouch 0003:0926:3333.00C5: fixing up Keytouch IEC report descriptor [ 2871.082742][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00C5/input/input126 04:38:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2871.181632][T32409] keytouch 0003:0926:3333.00C5: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2871.243547][ T2252] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2871.253921][ T2252] EXT4-fs (loop4): group descriptors corrupted! [ 2871.281757][ T1189] usb 6-1: USB disconnect, device number 88 [ 2871.306219][ T2252] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2871.321683][ T2252] EXT4-fs (loop4): group descriptors corrupted! 04:38:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xffffff97, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2871.412249][ T2283] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2871.424318][ T2283] EXT4-fs (loop4): group descriptors corrupted! 04:38:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:52 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x0, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:38:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(0x0, 0x1000000000016) [ 2872.863663][ T2301] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2872.875440][ T2301] EXT4-fs (loop4): group descriptors corrupted! 04:38:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2873.093530][ T2312] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2873.103875][ T2312] EXT4-fs (loop4): group descriptors corrupted! [ 2873.119736][T22548] usb 6-1: new high-speed USB device number 89 using dummy_hcd [ 2873.223280][ T2320] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2873.233762][ T2320] EXT4-fs (loop4): group descriptors corrupted! [ 2873.489764][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2873.500695][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2873.516685][T22548] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2873.529829][T22548] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2873.538463][T22548] usb 6-1: config 0 descriptor?? [ 2873.790708][ T2295] udc-core: couldn't find an available UDC or it's busy [ 2873.797703][ T2295] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:38:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(0x0, 0x1000000000016) [ 2874.030189][T22548] keytouch 0003:0926:3333.00C6: fixing up Keytouch IEC report descriptor [ 2874.048688][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00C6/input/input127 [ 2874.060963][ T2335] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2874.071299][ T2335] EXT4-fs (loop4): group descriptors corrupted! [ 2874.117120][ T2335] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2874.132336][ T2335] EXT4-fs (loop4): group descriptors corrupted! 04:38:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2874.163199][T22548] keytouch 0003:0926:3333.00C6: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2874.232241][T22548] usb 6-1: USB disconnect, device number 89 04:38:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x8000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0xc) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) vmsplice(r1, &(0x7f0000000100)=[{&(0x7f0000000340)="5c980e96bb4c00000000000000000000001321295ab7f3804406affbb1365fc3b3000000003f20521eff27e3a484561a36119e9762de739b69eb733766ab6551", 0x1c}], 0x1335, 0x2) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xfff) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2bd, 0x420000) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d000000ff0f000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b000005000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000006000000000000008a827dc700000000000000000000000000000043c956b69d5ff4608d157c17673a13dfea482ce6090e29068b4c7a5922bd7231206238384365b0"], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300)={0x0, r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0x0, 0x6, 0x5, 0x0, 0x0, 0x6, 0x28000, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x8, 0x8}, 0x10, 0x1f, 0x4, 0x8, 0x100, 0x6, 0x40}, r0, 0x8, r2, 0x1) tkill(r0, 0x40) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000140)={0x43, 0x9, 0x2, {0x2, 0xffff, 0x7, 0x2, 0xfff, 0xff, 0x1ff, 0xdab, 0xffff}}, 0x43) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2874.370129][ T2380] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2874.388225][ T2380] EXT4-fs (loop4): group descriptors corrupted! [ 2874.486917][ T2380] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2874.509737][ T2380] EXT4-fs (loop4): group descriptors corrupted! 04:38:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000040)) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x80000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:55 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x0, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2875.882250][ T2398] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2875.902557][ T2398] EXT4-fs (loop4): group descriptors corrupted! 04:38:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(0x0, 0x1000000000016) 04:38:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xedc000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2876.127684][ T2419] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2876.138301][ T2419] EXT4-fs (loop4): group descriptors corrupted! [ 2876.151754][ T1189] usb 6-1: new high-speed USB device number 90 using dummy_hcd [ 2876.239807][ T2431] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2876.251457][ T2431] EXT4-fs (loop4): group descriptors corrupted! 04:38:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2876.299117][ T2431] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2876.309589][ T2431] EXT4-fs (loop4): group descriptors corrupted! [ 2876.396456][ T2440] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2876.406837][ T2440] EXT4-fs (loop4): group descriptors corrupted! 04:38:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2876.533051][ T2447] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2876.543542][ T2447] EXT4-fs (loop4): group descriptors corrupted! [ 2876.559969][ T1189] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2876.583476][ T1189] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2876.601027][ T1189] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2876.615246][ T1189] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2876.627129][ T1189] usb 6-1: config 0 descriptor?? [ 2876.662945][ T2452] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2876.673197][ T2452] EXT4-fs (loop4): group descriptors corrupted! 04:38:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x40000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2876.802595][ T2461] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2876.818744][ T2461] EXT4-fs (loop4): group descriptors corrupted! [ 2876.880731][ T2400] udc-core: couldn't find an available UDC or it's busy [ 2876.887718][ T2400] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2877.140270][ T1189] keytouch 0003:0926:3333.00C7: fixing up Keytouch IEC report descriptor [ 2877.161312][ T1189] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00C7/input/input128 [ 2877.252508][ T1189] keytouch 0003:0926:3333.00C7: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2877.351389][ T1189] usb 6-1: USB disconnect, device number 90 04:38:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfc000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:38:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x0) 04:38:58 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2878.919977][ T2516] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2878.932584][ T2516] EXT4-fs (loop4): group descriptors corrupted! 04:38:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000b00000000000000000b00000500000000000000d5165200"/247], 0x0, 0xf7}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:38:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2879.121145][ T2535] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.131431][ T2535] EXT4-fs (loop4): group descriptors corrupted! 04:38:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2879.169754][ T1189] usb 6-1: new high-speed USB device number 91 using dummy_hcd [ 2879.199528][ T2535] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.211671][ T2535] EXT4-fs (loop4): group descriptors corrupted! [ 2879.293767][ T2550] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.304065][ T2550] EXT4-fs (loop4): group descriptors corrupted! [ 2879.376705][ T2550] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.387495][ T2550] EXT4-fs (loop4): group descriptors corrupted! 04:38:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x204000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2879.488107][ T2563] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.498735][ T2563] EXT4-fs (loop4): group descriptors corrupted! [ 2879.567941][ T2563] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.579770][ T1189] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2879.595225][ T2563] EXT4-fs (loop4): group descriptors corrupted! [ 2879.596144][ T1189] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:38:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2879.626532][ T1189] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2879.636017][ T1189] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2879.645143][ T1189] usb 6-1: config 0 descriptor?? 04:38:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x0) 04:38:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2879.704833][ T2575] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.720254][ T2575] EXT4-fs (loop4): group descriptors corrupted! [ 2879.808740][ T2583] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.819106][ T2583] EXT4-fs (loop4): group descriptors corrupted! [ 2879.885101][ T2583] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2879.896182][ T2512] udc-core: couldn't find an available UDC or it's busy [ 2879.905045][ T2512] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2879.924449][ T2583] EXT4-fs (loop4): group descriptors corrupted! [ 2880.180138][ T1189] keytouch 0003:0926:3333.00C8: fixing up Keytouch IEC report descriptor [ 2880.203329][ T1189] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00C8/input/input129 [ 2880.292833][ T1189] keytouch 0003:0926:3333.00C8: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2880.383257][ T1188] usb 6-1: USB disconnect, device number 91 04:39:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24050805, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r1, 0x0) 04:39:01 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2881.955416][ T2633] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2881.967636][ T2633] EXT4-fs (loop4): group descriptors corrupted! 04:39:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x10400, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0xb11000, 0x8, 0x5}, 0x18) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3f8, 0x800, 0x70bd2b, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000004) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x604000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2882.169936][ T2649] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2882.181769][ T2649] EXT4-fs (loop4): group descriptors corrupted! [ 2882.209609][T22548] usb 6-1: new high-speed USB device number 92 using dummy_hcd 04:39:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x700000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2882.344966][ T2666] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2882.357289][ T2666] EXT4-fs (loop4): group descriptors corrupted! [ 2882.443030][ T2672] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2882.455052][ T2672] EXT4-fs (loop4): group descriptors corrupted! [ 2882.506794][ T2672] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2882.527080][ T2672] EXT4-fs (loop4): group descriptors corrupted! 04:39:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x900000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2882.571148][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2882.589665][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2882.601158][T22548] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2882.612283][T22548] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 04:39:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xa00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2882.627718][T22548] usb 6-1: config 0 descriptor?? [ 2882.647560][ T2684] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2882.657801][ T2684] EXT4-fs (loop4): group descriptors corrupted! [ 2882.775380][ T2690] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2882.785923][ T2690] EXT4-fs (loop4): group descriptors corrupted! [ 2882.872649][ T2634] udc-core: couldn't find an available UDC or it's busy [ 2882.881350][ T2634] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2883.099994][T22548] keytouch 0003:0926:3333.00C9: fixing up Keytouch IEC report descriptor [ 2883.111490][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00C9/input/input130 [ 2883.192050][T22548] keytouch 0003:0926:3333.00C9: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2883.310647][ T1188] usb 6-1: USB disconnect, device number 92 04:39:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:04 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x0, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xb00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:04 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2884.975209][ T2741] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2884.995442][ T2741] EXT4-fs (loop4): group descriptors corrupted! 04:39:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xc00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000040)=0x7ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x2084, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x3}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2885.218351][ T2759] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2885.228676][ T2759] EXT4-fs (loop4): group descriptors corrupted! [ 2885.229572][ T1188] usb 1-1: new high-speed USB device number 30 using dummy_hcd [ 2885.236875][T32409] usb 6-1: new high-speed USB device number 93 using dummy_hcd [ 2885.312514][ T2759] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2885.333228][ T2759] EXT4-fs (loop4): group descriptors corrupted! 04:39:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xd00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xe00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2885.481588][ T2781] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2885.498325][ T2781] EXT4-fs (loop4): group descriptors corrupted! 04:39:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xf00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2885.629584][ T1188] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2885.641013][ T1188] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2885.651376][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2885.651869][ T1188] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2885.676858][ T1188] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2885.681474][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2885.685916][ T1188] usb 1-1: config 0 descriptor?? [ 2885.704594][ T2791] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2885.715171][ T2791] EXT4-fs (loop4): group descriptors corrupted! [ 2885.722415][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2885.739083][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2885.761504][T32409] usb 6-1: config 0 descriptor?? [ 2885.963333][ T2743] udc-core: couldn't find an available UDC or it's busy [ 2885.970553][ T2743] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2886.010576][ T2740] udc-core: couldn't find an available UDC or it's busy [ 2886.017730][ T2740] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2886.199997][ T1188] keytouch 0003:0926:3333.00CA: fixing up Keytouch IEC report descriptor [ 2886.211434][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.00CA/input/input131 [ 2886.259978][T32409] keytouch 0003:0926:3333.00CB: fixing up Keytouch IEC report descriptor [ 2886.271051][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00CB/input/input132 [ 2886.301623][ T1188] keytouch 0003:0926:3333.00CA: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 2886.381758][T32409] keytouch 0003:0926:3333.00CB: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2886.422289][T32409] usb 1-1: USB disconnect, device number 30 [ 2886.462602][ T1188] usb 6-1: USB disconnect, device number 93 04:39:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1004000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:07 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x0, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:07 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x0, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2888.017792][ T2881] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.034150][ T2881] EXT4-fs (loop4): group descriptors corrupted! 04:39:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b000005000000000800"/247], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2888.251886][ T2892] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.262120][ T2892] EXT4-fs (loop4): group descriptors corrupted! [ 2888.271246][T32409] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 2888.281623][T14619] usb 6-1: new high-speed USB device number 94 using dummy_hcd 04:39:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2888.311554][ T2892] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.329639][ T2892] EXT4-fs (loop4): group descriptors corrupted! 04:39:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x1400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2888.420501][ T2911] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.431189][ T2911] EXT4-fs (loop4): group descriptors corrupted! [ 2888.513438][ T2917] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.524121][ T2917] EXT4-fs (loop4): group descriptors corrupted! 04:39:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2888.600068][ T2917] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.612649][ T2917] EXT4-fs (loop4): group descriptors corrupted! [ 2888.681180][T32409] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2888.692222][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2888.706427][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2888.721545][T32409] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2888.731598][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2888.734328][ T2926] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.740856][T32409] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2888.752801][ T2926] EXT4-fs (loop4): group descriptors corrupted! [ 2888.770494][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2888.779407][T32409] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2888.799774][T14619] usb 6-1: config 0 descriptor?? [ 2888.805704][T32409] usb 1-1: config 0 descriptor?? 04:39:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2010000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2888.825210][ T2926] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.835929][ T2926] EXT4-fs (loop4): group descriptors corrupted! 04:39:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2888.952602][ T2939] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2888.962928][ T2939] EXT4-fs (loop4): group descriptors corrupted! [ 2889.043366][ T2947] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2889.050684][ T2878] udc-core: couldn't find an available UDC or it's busy [ 2889.055050][ T2947] EXT4-fs (loop4): group descriptors corrupted! [ 2889.071195][ T2878] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2889.071414][ T2875] udc-core: couldn't find an available UDC or it's busy [ 2889.094195][ T2875] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2889.119165][ T2947] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2889.129425][ T2947] EXT4-fs (loop4): group descriptors corrupted! [ 2889.331511][T14619] keytouch 0003:0926:3333.00CC: fixing up Keytouch IEC report descriptor [ 2889.352586][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00CC/input/input133 [ 2889.370006][T32409] keytouch 0003:0926:3333.00CD: fixing up Keytouch IEC report descriptor [ 2889.386257][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.00CD/input/input134 [ 2889.472385][T14619] keytouch 0003:0926:3333.00CC: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2889.532005][ T1188] usb 6-1: USB disconnect, device number 94 [ 2889.543166][T32409] keytouch 0003:0926:3333.00CD: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 2889.578502][T32409] usb 1-1: USB disconnect, device number 31 04:39:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2e00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:10 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x0, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:10 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x0, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2891.041918][ T3037] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2891.053491][ T3037] EXT4-fs (loop4): group descriptors corrupted! 04:39:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x3f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xe}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {0xa, 0x9}]}, @restrict, @union]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000040)=0x1c) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2891.282282][ T3058] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2891.299475][T14619] usb 6-1: new high-speed USB device number 95 using dummy_hcd [ 2891.303807][ T3058] EXT4-fs (loop4): group descriptors corrupted! [ 2891.321273][ T1188] usb 1-1: new high-speed USB device number 32 using dummy_hcd 04:39:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x128, 0x128, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @union={0xf, 0x9, 0x0, 0x5, 0x1, 0x84, [{0x9, 0x3, 0x2}, {0xa, 0x2, 0x5}, {0x6, 0x2, 0x2}, {0x6, 0x2, 0x8}, {0x3, 0x0, 0x2}, {0x8, 0x5, 0x9}, {0xd, 0x5, 0x987}, {0x9, 0x4, 0x5560000}, {0x10, 0x0, 0x2b9b927e}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x143}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2891.456020][ T3079] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2891.468441][ T3079] EXT4-fs (loop4): group descriptors corrupted! [ 2891.493909][ T3079] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2891.505904][ T3079] EXT4-fs (loop4): group descriptors corrupted! 04:39:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4000080000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2891.644166][ T3095] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2891.654407][ T3095] EXT4-fs (loop4): group descriptors corrupted! [ 2891.664634][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2891.676075][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:39:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2891.687012][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2891.696967][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2891.707048][T14619] usb 6-1: config 0 descriptor?? [ 2891.741138][ T1188] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2891.754347][ T1188] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2891.768918][ T1188] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2891.780637][ T1188] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2891.791208][ T1188] usb 1-1: config 0 descriptor?? [ 2891.808938][ T3101] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2891.819324][ T3101] EXT4-fs (loop4): group descriptors corrupted! 04:39:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2891.877106][ T3101] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2891.887478][ T3101] EXT4-fs (loop4): group descriptors corrupted! [ 2891.961283][ T3038] udc-core: couldn't find an available UDC or it's busy [ 2891.968509][ T3038] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2891.968645][ T3113] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2891.992879][ T3113] EXT4-fs (loop4): group descriptors corrupted! [ 2892.042873][ T3044] udc-core: couldn't find an available UDC or it's busy [ 2892.049857][ T3044] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2892.219914][T14619] keytouch 0003:0926:3333.00CE: fixing up Keytouch IEC report descriptor [ 2892.229393][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00CE/input/input135 [ 2892.279907][ T1188] keytouch 0003:0926:3333.00CF: fixing up Keytouch IEC report descriptor [ 2892.293947][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.00CF/input/input136 [ 2892.313193][T14619] keytouch 0003:0926:3333.00CE: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2892.393506][ T1188] keytouch 0003:0926:3333.00CF: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 2892.441525][T14619] usb 6-1: USB disconnect, device number 95 [ 2892.500845][ T1188] usb 1-1: USB disconnect, device number 32 04:39:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x4c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:13 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x0, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:13 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x0, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2894.070630][ T3196] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2894.096901][ T3196] EXT4-fs (loop4): group descriptors corrupted! 04:39:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x5c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2894.273649][ T3212] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2894.284715][ T3212] EXT4-fs (loop4): group descriptors corrupted! [ 2894.329439][ T1188] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 2894.337048][T18219] usb 6-1: new high-speed USB device number 96 using dummy_hcd [ 2894.366412][ T3212] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 04:39:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2894.376731][ T3212] EXT4-fs (loop4): group descriptors corrupted! 04:39:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @restrict={0x9}, @restrict={0xf}, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xd7}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) r4 = getpgid(0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}, @IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x7fffffff}}]}]}]}, 0x40}}, 0x0) process_vm_writev(r4, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6a01000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2894.475293][ T3231] A link change request failed with some changes committed already. Interface batadv_slave_1 may have been left with an inconsistent configuration, please check. [ 2894.493383][ T3231] A link change request failed with some changes committed already. Interface batadv_slave_1 may have been left with an inconsistent configuration, please check. [ 2894.530893][ T3240] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2894.543220][ T3240] EXT4-fs (loop4): group descriptors corrupted! [ 2894.595231][ T3240] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2894.605974][ T3240] EXT4-fs (loop4): group descriptors corrupted! 04:39:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2894.699496][ T1188] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2894.699510][ T1188] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2894.699571][ T1188] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2894.699587][ T1188] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2894.738467][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2894.747852][ T3251] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2894.761311][ T3251] EXT4-fs (loop4): group descriptors corrupted! [ 2894.762279][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:39:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6e01000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x6f01000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2894.783848][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2894.819417][ T1188] usb 1-1: config 0 descriptor?? [ 2894.824590][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2894.849225][T18219] usb 6-1: config 0 descriptor?? [ 2894.882800][ T3263] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2894.893056][ T3263] EXT4-fs (loop4): group descriptors corrupted! [ 2894.941880][ T3263] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2894.952097][ T3263] EXT4-fs (loop4): group descriptors corrupted! [ 2895.062669][ T3198] udc-core: couldn't find an available UDC or it's busy [ 2895.069758][ T3198] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2895.102124][ T3197] udc-core: couldn't find an available UDC or it's busy [ 2895.109082][ T3197] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2895.319999][ T1188] keytouch 0003:0926:3333.00D0: fixing up Keytouch IEC report descriptor [ 2895.338287][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.00D0/input/input137 [ 2895.369785][T18219] keytouch 0003:0926:3333.00D1: fixing up Keytouch IEC report descriptor [ 2895.379194][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00D1/input/input138 [ 2895.421616][ T1188] keytouch 0003:0926:3333.00D0: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 2895.500892][T18219] keytouch 0003:0926:3333.00D1: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2895.565664][T14617] usb 1-1: USB disconnect, device number 33 [ 2895.572522][T18219] usb 6-1: USB disconnect, device number 96 04:39:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x7400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:16 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2897.087372][ T3361] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.097520][ T3361] EXT4-fs (loop4): group descriptors corrupted! 04:39:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:17 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x0, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x781e70c800000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2897.290727][ T3371] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.302351][ T3371] EXT4-fs (loop4): group descriptors corrupted! [ 2897.349419][T18219] usb 1-1: new high-speed USB device number 34 using dummy_hcd [ 2897.390326][ T3371] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.400653][ T3371] EXT4-fs (loop4): group descriptors corrupted! 04:39:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x7a00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2897.490402][ T3393] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.500754][ T3393] EXT4-fs (loop4): group descriptors corrupted! 04:39:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2897.559772][ T3393] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.569953][ T3393] EXT4-fs (loop4): group descriptors corrupted! [ 2897.586624][T32409] usb 6-1: new high-speed USB device number 97 using dummy_hcd [ 2897.670834][ T3408] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.684012][ T3408] EXT4-fs (loop4): group descriptors corrupted! [ 2897.717311][ T3408] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.728031][T18219] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2897.740542][ T3408] EXT4-fs (loop4): group descriptors corrupted! [ 2897.746891][T18219] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2897.770278][T18219] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2897.780992][T18219] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2897.799873][T18219] usb 1-1: config 0 descriptor?? 04:39:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x9002000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2897.876820][ T3420] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.896453][ T3420] EXT4-fs (loop4): group descriptors corrupted! [ 2897.963996][ T3425] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2897.974266][ T3425] EXT4-fs (loop4): group descriptors corrupted! [ 2898.009409][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2898.020343][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2898.037798][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2898.050311][ T3362] udc-core: couldn't find an available UDC or it's busy [ 2898.057532][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2898.066420][ T3362] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2898.099780][T32409] usb 6-1: config 0 descriptor?? [ 2898.117811][ T3425] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2898.127958][ T3425] EXT4-fs (loop4): group descriptors corrupted! 04:39:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x9102000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2898.202024][ T3437] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2898.212302][ T3437] EXT4-fs (loop4): group descriptors corrupted! [ 2898.331407][T18219] keytouch 0003:0926:3333.00D2: fixing up Keytouch IEC report descriptor [ 2898.341992][ T3375] udc-core: couldn't find an available UDC or it's busy [ 2898.351251][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.00D2/input/input139 [ 2898.363716][ T3375] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2898.443135][T18219] keytouch 0003:0926:3333.00D2: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 2898.557081][T18219] usb 1-1: USB disconnect, device number 34 [ 2898.638916][T32409] keytouch 0003:0926:3333.00D3: fixing up Keytouch IEC report descriptor [ 2898.648736][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00D3/input/input140 [ 2898.740889][T32409] keytouch 0003:0926:3333.00D3: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2898.836683][T32409] usb 6-1: USB disconnect, device number 97 04:39:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x9502000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x9002000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2900.098423][ T3514] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2900.112208][ T3514] EXT4-fs (loop4): group descriptors corrupted! 04:39:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:20 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x0, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:20 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x0, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x97ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d00000000000000000000f0f98e468679b7c3e7ae7c00000000000004000006040000000000000000000000000000000000800000000000000000000000000000000000000000000000000b00000000000000000b000005008b8b879a02f23700000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b186f494c9ca0000000000000000000000000000000000000000000000000000e60a6714e03fe692eb3b2e92118ddb9cdeb31d7d3fe6b36658ea3876d29e47304bec54cff8a6cff509e270890e6159f79979f05011e1da6d588973aa177f3a98ccaae313e1d9be946be106debfda555580a58a21dd9d6f133bbf0c97812c6d46db34180cbc17eb32d5ca7ba1ba58c1a9230bfa9c98d5ad82f720f8ab116ae2da8610990392d263990b14ecae6d95c25689b4a51fc425bd63119637f26b8c04c50306"], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2900.502314][ T3538] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2900.512559][ T3538] EXT4-fs (loop4): group descriptors corrupted! [ 2900.555497][ T3538] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2900.572457][ T3538] EXT4-fs (loop4): group descriptors corrupted! 04:39:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2900.611168][T32409] usb 1-1: new high-speed USB device number 35 using dummy_hcd [ 2900.618769][T14617] usb 6-1: new high-speed USB device number 98 using dummy_hcd 04:39:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xf9fdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2900.687738][ T3557] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2900.700461][ T3557] EXT4-fs (loop4): group descriptors corrupted! 04:39:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfbffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2900.774496][ T3561] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2900.791144][ T3561] EXT4-fs (loop4): group descriptors corrupted! [ 2900.867915][ T3568] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2900.878062][ T3568] EXT4-fs (loop4): group descriptors corrupted! [ 2900.913204][ T3568] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2900.929649][ T3568] EXT4-fs (loop4): group descriptors corrupted! 04:39:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2901.019348][T32409] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2901.030267][T14617] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2901.042136][ T3578] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2901.052299][T14617] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2901.069755][T32409] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2901.079603][ T3578] EXT4-fs (loop4): group descriptors corrupted! [ 2901.100585][T14617] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2901.109887][T32409] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2901.120545][T14617] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2901.130117][T32409] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2901.139812][T14617] usb 6-1: config 0 descriptor?? [ 2901.145729][T32409] usb 1-1: config 0 descriptor?? [ 2901.151058][ T3578] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2901.161510][ T3578] EXT4-fs (loop4): group descriptors corrupted! [ 2901.401536][ T3529] udc-core: couldn't find an available UDC or it's busy [ 2901.408684][ T3529] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2901.413241][ T3528] udc-core: couldn't find an available UDC or it's busy [ 2901.424183][ T3528] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2901.659878][T32409] keytouch 0003:0926:3333.00D4: fixing up Keytouch IEC report descriptor [ 2901.668846][T14617] keytouch 0003:0926:3333.00D5: fixing up Keytouch IEC report descriptor [ 2901.681190][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00D5/input/input142 [ 2901.693860][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.00D4/input/input141 [ 2901.771253][T14617] keytouch 0003:0926:3333.00D5: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2901.850675][T32409] keytouch 0003:0926:3333.00D4: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 2901.878682][T18219] usb 6-1: USB disconnect, device number 98 [ 2901.879853][T32409] usb 1-1: USB disconnect, device number 35 04:39:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfdffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:22 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2903.132698][ T3665] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2903.143107][ T3665] EXT4-fs (loop4): group descriptors corrupted! 04:39:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:23 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x0, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2903.364854][ T3683] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2903.376972][ T3683] EXT4-fs (loop4): group descriptors corrupted! [ 2903.390571][ T1188] usb 1-1: new high-speed USB device number 36 using dummy_hcd 04:39:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xff0f000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2903.422104][ T3683] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2903.434202][ T3683] EXT4-fs (loop4): group descriptors corrupted! 04:39:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d00000000000000000000000000000000040000060400000000000000000000000000000000000000000000000000000000000000000000000000a1000000000b00000000000000000b00000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000080000000000000000000005000000000000"], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x482001, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000240)={{0x0, 0x1, 0x5, 0x1, 0x10001}}) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x10, 0x80000) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r2, 0x9d12, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) 04:39:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xfffbffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2903.542447][ T3696] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2903.571140][ T3696] EXT4-fs (loop4): group descriptors corrupted! [ 2903.619356][T32409] usb 6-1: new high-speed USB device number 99 using dummy_hcd [ 2903.653994][ T3707] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 04:39:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2903.664743][ T3707] EXT4-fs (loop4): group descriptors corrupted! [ 2903.749554][ T1188] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2903.760759][ T1188] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2903.765146][ T3714] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2903.771377][ T1188] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2903.795175][ T3714] EXT4-fs (loop4): group descriptors corrupted! [ 2903.804989][ T1188] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2903.817570][ T1188] usb 1-1: config 0 descriptor?? 04:39:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xffffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2903.849118][ T3714] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2903.859305][ T3714] EXT4-fs (loop4): group descriptors corrupted! [ 2903.861788][ T1188] usbhid 1-1:0.0: can't add hid device: -22 [ 2903.886077][ T1188] usbhid: probe of 1-1:0.0 failed with error -22 04:39:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2903.939580][ T3727] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2903.954094][ T3727] EXT4-fs (loop4): group descriptors corrupted! [ 2904.009332][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2904.025024][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2904.043820][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2904.058376][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2904.073482][ T3733] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2904.084599][T32409] usb 6-1: config 0 descriptor?? [ 2904.098831][ T3733] EXT4-fs (loop4): group descriptors corrupted! [ 2904.105255][ T3666] udc-core: couldn't find an available UDC or it's busy [ 2904.117850][ T3666] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2904.351667][ T3677] udc-core: couldn't find an available UDC or it's busy [ 2904.358733][ T3677] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2904.599644][T32409] keytouch 0003:0926:3333.00D6: fixing up Keytouch IEC report descriptor [ 2904.612214][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00D6/input/input143 [ 2904.702311][T32409] keytouch 0003:0926:3333.00D6: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2904.813339][ T1188] usb 6-1: USB disconnect, device number 99 04:39:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2906.140395][ T1188] usb 1-1: USB disconnect, device number 36 [ 2906.178238][ T3795] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2906.207191][ T3795] EXT4-fs (loop4): group descriptors corrupted! 04:39:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:26 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:39:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msgctl$IPC_RMID(0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {0x0, 0xfffffffc}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003640)={0x10, 0x0, 0x0, 0x1080084}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x68, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x100, 0x79}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}]}, 0x68}}, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) r4 = getpgid(0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="2000000010000100"/20, @ANYRES32=r3, @ANYBLOB="0000000093100300"], 0x20}}, 0x0) process_vm_writev(r4, &(0x7f0000002580)=[{&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000140)=""/186, 0xba}, {&(0x7f0000000200)=""/210, 0xd2}, {&(0x7f0000001400)=""/213, 0xd5}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000000040)=""/14, 0xe}, {&(0x7f0000002500)=""/115, 0x73}], 0x7, &(0x7f0000003600)=[{&(0x7f0000002600)=""/4096, 0x1000}], 0x1, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2906.610365][ T3824] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2906.621994][ T3826] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2906.630654][ T3824] EXT4-fs (loop4): group descriptors corrupted! [ 2906.649613][ T1188] usb 6-1: new high-speed USB device number 100 using dummy_hcd 04:39:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) keyctl$session_to_parent(0x12) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400001, 0x4a) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000140)={0x0, "8f8d3d14002f37a5d0faa13e01232fa4b35f64e6ae137db4cfc4a823f044ee50", 0x2, 0x20, 0x1f, 0x67cb, 0x4, 0x1, 0x4, 0x5da}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2906.737770][ T3824] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2906.748281][ T3824] EXT4-fs (loop4): group descriptors corrupted! [ 2906.826764][ T3847] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2906.837711][ T3847] EXT4-fs (loop4): group descriptors corrupted! [ 2906.901904][ T3847] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2906.912310][ T3847] EXT4-fs (loop4): group descriptors corrupted! 04:39:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2907.003449][ T3858] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2907.013729][ T3858] EXT4-fs (loop4): group descriptors corrupted! [ 2907.029461][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 04:39:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2907.052754][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2907.062907][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2907.075878][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2907.085532][ T1188] usb 6-1: config 0 descriptor?? [ 2907.116123][ T3865] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2907.130172][ T3865] EXT4-fs (loop4): group descriptors corrupted! [ 2907.350094][ T3810] udc-core: couldn't find an available UDC or it's busy [ 2907.357056][ T3810] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2907.589569][ T1188] keytouch 0003:0926:3333.00D7: fixing up Keytouch IEC report descriptor [ 2907.600900][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00D7/input/input144 [ 2907.680328][ T1188] keytouch 0003:0926:3333.00D7: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2907.791484][T14619] usb 6-1: USB disconnect, device number 100 04:39:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:29 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2909.417774][ T3919] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2909.429273][ T3919] EXT4-fs (loop4): group descriptors corrupted! 04:39:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2909.496454][ T3919] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2909.527628][ T3919] EXT4-fs (loop4): group descriptors corrupted! 04:39:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2909.605414][ T3938] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2909.615583][ T3938] EXT4-fs (loop4): group descriptors corrupted! 04:39:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2909.678453][T32409] usb 6-1: new high-speed USB device number 101 using dummy_hcd [ 2909.691730][ T3947] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2909.704035][ T3947] EXT4-fs (loop4): group descriptors corrupted! 04:39:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @none, 0x43d3, 0x1}, 0xe) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b00000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2ff00"/247], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2909.804168][ T3954] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2909.814963][ T3954] EXT4-fs (loop4): group descriptors corrupted! 04:39:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x29, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2909.884103][ T3966] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2909.895588][ T3966] EXT4-fs (loop4): group descriptors corrupted! [ 2909.989798][ T3973] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2910.000307][ T3973] EXT4-fs (loop4): group descriptors corrupted! [ 2910.038353][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2910.050982][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2910.062553][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2910.073683][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 04:39:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2910.091004][T32409] usb 6-1: config 0 descriptor?? [ 2910.099131][ T3973] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2910.113723][ T3973] EXT4-fs (loop4): group descriptors corrupted! [ 2910.206081][ T3985] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2910.216563][ T3985] EXT4-fs (loop4): group descriptors corrupted! [ 2910.267140][ T3985] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2910.287294][ T3985] EXT4-fs (loop4): group descriptors corrupted! [ 2910.329183][ T3918] udc-core: couldn't find an available UDC or it's busy [ 2910.336276][ T3918] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2910.588567][T32409] keytouch 0003:0926:3333.00D8: fixing up Keytouch IEC report descriptor [ 2910.597961][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00D8/input/input145 [ 2910.701588][T32409] keytouch 0003:0926:3333.00D8: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2910.791407][T18219] usb 6-1: USB disconnect, device number 101 04:39:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x46, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:32 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$cont(0x7, r3, 0x0, 0x0) 04:39:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2912.449806][ T4031] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2912.470611][ T4031] EXT4-fs (loop4): group descriptors corrupted! [ 2912.514315][ T4031] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2912.524556][ T4031] EXT4-fs (loop4): group descriptors corrupted! 04:39:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x64, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2912.672359][ T4059] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2912.682748][ T4059] EXT4-fs (loop4): group descriptors corrupted! [ 2912.717424][T32409] usb 6-1: new high-speed USB device number 102 using dummy_hcd 04:39:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000100000d0000000000000000000000000000000004000006040000000000000000000000005c368601d772432c0000000000000000000000000000000000000000000000000000000000000b00000000000000000b00000500"/255], 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f0000000240)=""/243) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x88, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x8a, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2912.851777][ T4077] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2912.863766][ T4077] EXT4-fs (loop4): group descriptors corrupted! [ 2912.954103][ T4091] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2912.964320][ T4091] EXT4-fs (loop4): group descriptors corrupted! 04:39:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x8c, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2913.006596][ T4091] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2913.016904][ T4091] EXT4-fs (loop4): group descriptors corrupted! [ 2913.087478][ T4104] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2913.097786][ T4104] EXT4-fs (loop4): group descriptors corrupted! [ 2913.127305][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2913.138288][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2913.154687][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2913.167270][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2913.207354][T32409] usb 6-1: config 0 descriptor?? [ 2913.214917][ T4104] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2913.233135][ T4104] EXT4-fs (loop4): group descriptors corrupted! 04:39:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x10e, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2913.325174][ T4119] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2913.335473][ T4119] EXT4-fs (loop4): group descriptors corrupted! [ 2913.459261][ T4037] udc-core: couldn't find an available UDC or it's busy [ 2913.466487][ T4037] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2913.707582][T32409] keytouch 0003:0926:3333.00D9: fixing up Keytouch IEC report descriptor [ 2913.726034][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00D9/input/input146 [ 2913.809870][T32409] keytouch 0003:0926:3333.00D9: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2913.909475][T14619] usb 6-1: USB disconnect, device number 102 04:39:34 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2914.716729][ T1188] usb 6-1: new high-speed USB device number 103 using dummy_hcd [ 2915.116662][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2915.127652][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2915.142302][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2915.152898][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2915.164931][ T1188] usb 6-1: config 0 descriptor?? 04:39:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$cont(0x7, r3, 0x0, 0x0) 04:39:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x377, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2915.427378][ T4176] udc-core: couldn't find an available UDC or it's busy [ 2915.434327][ T4176] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2915.473788][ T4189] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2915.484624][ T4189] EXT4-fs (loop4): group descriptors corrupted! [ 2915.578566][ T4189] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2915.589945][ T4189] EXT4-fs (loop4): group descriptors corrupted! 04:39:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="200001"], 0x38}}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x3f7, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2915.686941][ T1188] keytouch 0003:0926:3333.00DA: fixing up Keytouch IEC report descriptor [ 2915.696344][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00DA/input/input147 04:39:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x416, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2915.734230][ T4214] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2915.751350][ T4214] EXT4-fs (loop4): group descriptors corrupted! [ 2915.798572][ T1188] keytouch 0003:0926:3333.00DA: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 04:39:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x28c100) vmsplice(r1, &(0x7f0000000600)=[{&(0x7f0000000100)="191cd3e35efa4aa68a1624c94e076378cc514bae08339be494006766a3c26a8e15ad5b820306ca6b55eecdb4811a6332b43b656bf059ee5559bf04322842b0301ab514de18e8da6742746a34fc9f00d044f30ee1a56033ae3e07b1d21cce83988a31dfb576b29243a0fabf3eef36fa5c84dece3b0f6bdc7fd5cf7abc6bf723c7ffe780e7971aa2ccda99ff95ef29aadbe0507b6b0ba6960632429a1b07ed23e9fc44c06d5c77f0ad6fa4a88bfd7cc59e3fa9060759ba26bf25fde5f2f276d3367ed3fb69e07dc6369024b3eb9fcbf2c8d7f50989949fb1690ef80c478b", 0xdd}, {&(0x7f0000000040)="5592b45b4a09f9bfb1edbeef5fd9684c7dea1a293a7350", 0x17}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000400)="484fc8e39b37180100000000000000a45ad8965e0cc371b08cc8d020cc88db4b03c14e4211f917cf46bd515415efd32ec9dc57f076735a56682836cd988f51175a7beb930eded79e734d51e2cf55f88c041c89c915b87adf3880930000001d6ee0e95e9c5a1792ce3caafe8f0b2cd41749a23cb5b0e349a1ccd80203419f05ac35c482ec9a290c8bcf64a446099569ce8674802ca50a6d26470c4035db3e548c36f6da8dee324d53141dc6f7855eeea952c1caebda", 0xb5}, {&(0x7f0000000500)="e6e908854b7c30433089b3b6c46bde49f49af7742f240fded98ab28d46bfed0f8ed3a34e0ca6a81d622bc912a4bc6a4ae2cffd5ed68c139f57b6531d90989e418408b2decbc670528acc3672b2dfe0f786ec24edabe2e787d1a1d69d349db5c9790a47ef8f46ca6dce3d7a9485c0e4f580afc48488e439a3bfce95cf20c86c7de4eb07d9a0db909c98a252b302e8a19233e97db8f3f5b46953ea59691f0478f33e50c1a1cbdd43c9706aada7097a7a574b92af18f23d0dab849702a9ce32d1eda343389e8d111bd1ea276ef8e8ed59beddc0cf87b55e4d9b14f4f233", 0xdc}], 0x5, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2915.881661][ T4239] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2915.902388][ T1188] usb 6-1: USB disconnect, device number 103 04:39:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x417, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2915.929968][ T4239] EXT4-fs (loop4): group descriptors corrupted! [ 2916.021101][ T4278] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2916.032718][ T4278] EXT4-fs (loop4): group descriptors corrupted! 04:39:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x418, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2916.107768][ T4278] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2916.120312][ T4278] EXT4-fs (loop4): group descriptors corrupted! [ 2916.202518][ T4288] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2916.212880][ T4288] EXT4-fs (loop4): group descriptors corrupted! [ 2916.266940][ T4288] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2916.277297][ T4288] EXT4-fs (loop4): group descriptors corrupted! 04:39:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x419, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:36 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2916.383361][ T4301] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2916.394042][ T4301] EXT4-fs (loop4): group descriptors corrupted! [ 2916.490210][ T4301] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2916.508526][ T4301] EXT4-fs (loop4): group descriptors corrupted! 04:39:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x41a, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2916.609801][ T4318] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2916.620039][ T4318] EXT4-fs (loop4): group descriptors corrupted! [ 2916.689494][ T4318] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2916.705105][ T4318] EXT4-fs (loop4): group descriptors corrupted! [ 2916.780170][T32409] usb 6-1: new high-speed USB device number 104 using dummy_hcd [ 2917.146187][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2917.158219][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2917.171524][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2917.182371][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2917.194082][T32409] usb 6-1: config 0 descriptor?? [ 2917.447042][ T4312] udc-core: couldn't find an available UDC or it's busy [ 2917.454063][ T4312] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2917.686111][T32409] keytouch 0003:0926:3333.00DB: fixing up Keytouch IEC report descriptor [ 2917.695548][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00DB/input/input148 [ 2917.787130][T32409] keytouch 0003:0926:3333.00DB: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2917.888493][T14619] usb 6-1: USB disconnect, device number 104 04:39:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$cont(0x7, r3, 0x0, 0x0) 04:39:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x41b, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2918.492422][ T4386] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2918.502581][ T4386] EXT4-fs (loop4): group descriptors corrupted! [ 2918.564768][ T4386] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2918.575078][ T4386] EXT4-fs (loop4): group descriptors corrupted! 04:39:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:38 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x41c, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2918.728987][ T4408] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2918.739175][ T4408] EXT4-fs (loop4): group descriptors corrupted! 04:39:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @fwd={0x6}, @union]}, {0x0, [0x0]}}, 0x0, 0x73, 0x0, 0x40}, 0x20) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) write$qrtrtun(r1, &(0x7f0000000140)="e9d7a5f0075d25dc36bdf817201c1e043c68d8a702cb7e8202648b12ad76f17a02eb9718c832eb8a3fbc1a37184ebb1dd83cb976fe27a600cd32844d1ce6e16a882cb09c06584a55e4e76b354f3900303f2fe7f0fbd23c59c32b81b775e27528800620e16e53b98fcd31b8efb903914a9e09e3042de2113c7461eef220428d2856cb7a05361c62332c66120107c6c4f8329cf4134e61c2d91b15c779c0e78438fbc687e76fd6c55b4594133e40e6fc91c4970192f1f5a17647a30dccf097b7c74455e98e958a8f29e51b5babc52cd25f21ad5388b3903c8015859f30f0228089a28b", 0xe2) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x41d, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="200001"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', r4, 0x2b, 0x3, 0x81, 0xc27, 0x14, @loopback, @private0, 0x40, 0x10, 0x80000001}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x41e, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2918.966855][ T4426] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2918.977214][ T4426] EXT4-fs (loop4): group descriptors corrupted! [ 2918.996671][T18219] usb 6-1: new high-speed USB device number 105 using dummy_hcd [ 2919.094315][ T4438] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2919.105972][ T4438] EXT4-fs (loop4): group descriptors corrupted! [ 2919.186296][ T4438] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2919.196785][ T4438] EXT4-fs (loop4): group descriptors corrupted! 04:39:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x41f, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2919.284822][ T4449] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2919.295328][ T4449] EXT4-fs (loop4): group descriptors corrupted! 04:39:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x420, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2919.356672][ T4449] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2919.368903][ T4449] EXT4-fs (loop4): group descriptors corrupted! [ 2919.415402][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2919.435173][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2919.445217][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2919.455756][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2919.461654][ T4457] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2919.488170][T18219] usb 6-1: config 0 descriptor?? [ 2919.495058][ T4457] EXT4-fs (loop4): group descriptors corrupted! 04:39:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x26a3, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2919.617257][ T4467] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2919.687097][ T4467] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2919.728654][ T4410] udc-core: couldn't find an available UDC or it's busy [ 2919.735962][ T4410] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2919.985416][T18219] keytouch 0003:0926:3333.00DC: fixing up Keytouch IEC report descriptor [ 2919.994865][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00DC/input/input149 [ 2920.086717][T18219] keytouch 0003:0926:3333.00DC: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2920.187375][T18219] usb 6-1: USB disconnect, device number 105 04:39:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2701, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:41 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2921.540839][ T4513] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2921.626568][ T4513] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:39:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:39:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0200000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2921.767754][ T4531] EXT4-fs (loop4): inodes count not valid: 2 vs 16 [ 2921.774425][ T1188] usb 6-1: new high-speed USB device number 106 using dummy_hcd 04:39:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0800000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x5) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="200001"], 0x38}}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2921.994975][ T4540] EXT4-fs (loop4): inodes count not valid: 8 vs 16 [ 2922.017346][ T4540] EXT4-fs (loop4): inodes count not valid: 8 vs 16 04:39:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a00000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2922.108676][ T4559] EXT4-fs (loop4): inodes count not valid: 10 vs 16 [ 2922.144548][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 04:39:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2900000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2922.155514][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2922.165384][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2922.174825][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2922.183588][ T1188] usb 6-1: config 0 descriptor?? [ 2922.200438][ T4559] EXT4-fs (loop4): inodes count not valid: 10 vs 16 [ 2922.270372][ T4570] EXT4-fs (loop4): inodes count not valid: 41 vs 16 04:39:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1001000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2922.359179][ T4570] EXT4-fs (loop4): inodes count not valid: 41 vs 16 [ 2922.435281][ T4514] udc-core: couldn't find an available UDC or it's busy [ 2922.444244][ T4514] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2922.464456][ T4580] EXT4-fs (loop4): inodes count not valid: 272 vs 16 [ 2922.510533][ T4580] EXT4-fs (loop4): inodes count not valid: 272 vs 16 04:39:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0005000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0009000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2922.599777][ T4590] EXT4-fs (loop4): inodes count not valid: 1280 vs 16 [ 2922.666353][ T4596] EXT4-fs (loop4): inodes count not valid: 2304 vs 16 [ 2922.694619][ T1188] keytouch 0003:0926:3333.00DD: fixing up Keytouch IEC report descriptor [ 2922.715767][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00DD/input/input150 [ 2922.796015][ T1188] keytouch 0003:0926:3333.00DD: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2922.903371][T14619] usb 6-1: USB disconnect, device number 106 04:39:43 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2923.693828][T14617] usb 6-1: new high-speed USB device number 107 using dummy_hcd [ 2924.075144][T14617] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2924.086189][T14617] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2924.099452][T14617] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2924.108760][T14617] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2924.120588][T14617] usb 6-1: config 0 descriptor?? [ 2924.377136][ T4636] udc-core: couldn't find an available UDC or it's busy [ 2924.384157][ T4636] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2924.624000][T14617] keytouch 0003:0926:3333.00DE: fixing up Keytouch IEC report descriptor [ 2924.637120][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00DE/input/input151 [ 2924.715001][T14617] keytouch 0003:0926:3333.00DE: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 04:39:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="000b000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2924.825828][T14617] usb 6-1: USB disconnect, device number 107 [ 2924.859055][ T4668] EXT4-fs (loop4): inodes count not valid: 2816 vs 16 04:39:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0110000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000400)=""/4096, 0x1000) 04:39:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2924.985087][ T4695] EXT4-fs (loop4): inodes count not valid: 4097 vs 16 [ 2925.067987][ T4695] EXT4-fs (loop4): inodes count not valid: 4097 vs 16 04:39:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0020000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2925.158900][ T4716] EXT4-fs (loop4): inodes count not valid: 8192 vs 16 [ 2925.225723][ T4716] EXT4-fs (loop4): inodes count not valid: 8192 vs 16 04:39:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="014c000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:45 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2925.318253][ T4725] EXT4-fs (loop4): inodes count not valid: 19457 vs 16 [ 2925.361117][ T4725] EXT4-fs (loop4): inodes count not valid: 19457 vs 16 04:39:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01ff000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2925.461639][ T4738] EXT4-fs (loop4): inodes count not valid: 65281 vs 16 04:39:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000001000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2925.503310][ T4738] EXT4-fs (loop4): inodes count not valid: 65281 vs 16 04:39:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000002000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2925.571491][ T4749] EXT4-fs (loop4): bad geometry: first data block 1 is beyond end of filesystem (1) [ 2925.653209][ T1188] usb 6-1: new high-speed USB device number 108 using dummy_hcd [ 2925.677664][ T4754] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2925.690140][ T4754] EXT4-fs (loop4): group descriptors corrupted! [ 2926.013291][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2926.032307][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2926.049153][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2926.061503][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2926.074848][ T1188] usb 6-1: config 0 descriptor?? [ 2926.313973][ T4733] udc-core: couldn't find an available UDC or it's busy [ 2926.321010][ T4733] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2926.553387][ T1188] keytouch 0003:0926:3333.00DF: fixing up Keytouch IEC report descriptor [ 2926.562787][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00DF/input/input152 [ 2926.644546][ T1188] keytouch 0003:0926:3333.00DF: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2926.754712][T14619] usb 6-1: USB disconnect, device number 108 04:39:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00'}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000008000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:47 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x0, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2927.842829][ T4816] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2927.853735][ T4816] EXT4-fs (loop4): group descriptors corrupted! 04:39:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) tkill(0xffffffffffffffff, 0x15) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xdf83, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000180)="c7f5b02738c187cc48c63eaf9ef812f9638e6ce86785d00b0a310fba8cbf71135ea51ae1c7b9fbd57e1914e9a859f7e1af54", 0x32, 0x6}, {&(0x7f00000001c0)="7ee67d38dbc288bc6852c4b3a036c5f23c1db9bb3e482474aff4cfffa0260d494ddcffc1845b0b7cf3769fb15c7950531443981eeab020f13409e6002b507508b9aea112d0f52ebaa6957922810bc69f4e3bc06a7134db4154e3695d946653e067d1c1a0918d611056adeb570a9ea1947711ca8b", 0x74, 0x80000001}, {&(0x7f0000000240)="a509fbb088b13d3d4d83d66bcc39c114effb0abcb2d86da47d56a82f1c396ae8038d9eeb79a2e6f3c09fdaf072a4acea914076a4f373839d103d182a12d88753e19219337a3934336deff50b1e5d51645d7287ac762b47a5aed9cadfbee213c20044e680de8c6bbbd14eb2d98c938f6752038f574ef59bf7489dc3faab722b1c9de240b4694dead898", 0x89, 0xfffffffffffffffe}, {&(0x7f0000000400)="41452cf3c9f3615cc9a89ed6a57e426e677ee1f6204b05dc520878ddd6e03b1588fc3c6e1e8de9da2785822a9302e488e062551b0a5d161c4c1405836aa8d946663d817996254bcbbbb6a1156c3e7dc6a0dade8f21bdfc35cbddd346d80ad4dc0a60ad57687968d5e34b9eec377a80f0b9fc3f3c3d9cea8793289cb978be389e2ba82ca1ab31c7e0d83916382539", 0x8e, 0x7}, {&(0x7f00000004c0)="0550bab460ddf5535a4b55925a76ff70d8ed81ae974e683964a984266e109c0fae0869029a0a964a7adeb9cb05d7b6799f47d2a0ccfdd73007a9711265587e11b1c8f355136e9e303160770913a57462250aa8a7e942dc9e5a8d1e7353a43d091c016983a93e5c221d003eb83c5ec9987e71f6fc435b7232145458280afa821e75e29424bf59c50f66050fb72ebc9194185dff3fe07460455cb1461fb90bf7fadefefd39cca063f24cfdb906f9773ec36455f8cca1fc0e8734be9dbbe423ffb272e8d388240866c90c7443b9ddf7974b5f0621a97bd1a3457931e225573dac", 0xdf}], 0x8050, &(0x7f0000000640)=ANY=[@ANYBLOB='nointegrity,permit_directio\rsmackfstransmute=,fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0x7}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, &(0x7f00000006c0)={0xb2c, "09444653e8c19f35fa2c379f02664f92054539c044024a189e7fda277494dd7c08828c4ed31fe7b57c8e88f4b6edcaa80c98379944f7a47bce1731ebb52e1e9b842fa7081835ee15f58c475a55e5aa83975be68988eccd94184717c1a62d3f82adbb17e476ff9258ecb798fdcceb61eb0762b8c39671c7e0d58126c9c424bb5e037d3cd9d26749f5370d49fd4fe9abb1196d08f0acaeb4d577080092f1269cc13378138e0eeae0faba62c4289cfc7cc16bf1b654e4c3ffe2e8d8edf213ceb17c26fbaee40b7bdcc19bd317e2503c58292159a883808fb9de61c55b3a03c8fbf9d3015541811cd43398e94b367244991f7d4b9b2b93ea76eb285eedf3ff47e3ac3c943bced96de5dd0794262c36860609cf4f1d5127c4cb00e25295b008d8499a30f17db34134bc4758dbbd7712fb280518c1fa4b87724b90e11d39babb97c604bf44bd70d6cfad6e299df7373c70e37f797a8202546ec8488bf4fd2048d69441d100954a320d133ba4b457c6c90f30d98d440692c22fca982fa33038459f8c2de9de93c06d08832c395392d891b77acfcca2ad6e3a4a715d9bac6f6f08f89195f4f60c637dcb22087ab4111d945ba945008f9a308f4da31d5884fb439a92f9c01cde24caa93dec0add6af763d4a7f270d5ec0a15ea1a330a7e2d672f3f507b399d829e0435c7af73e958c03a380001c89a37f3a23f3b22ceaad7adaf8c6a103b1b8cd2d0ea31a55b0f27105fdbd2cf07b5a35e47431c26c2d49fe08533573082db7294968209ea233d8f6b82857b29205c6f8f11a812788a883136e5c41d74f0369b7b9e5b35192fe6aed1b4e1b13244d34f9f64b5daf8b27399d64871686dedc3c0cd6bc3f4a4c275c394ff8798699a870ac1da4d7d26b1bb7fdccc5ba68c395c1993dab2a9e44727b797e7250f4798c62178d8b8128352446a3e4807af53fefe74abc6a3286066e9e306c455b27b29f1da7f954f4a5f3a509175b74bd3de57011874102f22a58fd4f082c72ffb7e0023d4a2bb3c701dc18b0334bb879006f6ee11c5dd7c34106b17c82ab719eb0295a7a5734bb3ea9d267beaebb260d5c13440adc6028c1f35dd306f0049ac092b7c2cd2e1b793ea148e33fc1a242e8d4ef50263886ac320dec296ec8131c18c8052db83f615263ce84be999ca6e4b8175fd22b2b1102d7c461174d367a82a5d3df13bd1c70f88d120428dd4a2d1fcc55d6fd90e1e79d29bb800479ac60cce78713c3ce011f5308ef487150a749cd7d0329a8c05be020e09c57e8c79f6eec783aca5fb57651a4dfd39c6646072537eeb1307dd83914ea76580adf03ba27bb9eb2fcc78817600356b71ec5be6044f9be9f44c298625b2a2638604efa7583fc77cad6b9c08aa3640fabbd4320429c766bb2868dfb69510c3c09d56141edcc573015fd3999c7fff27ed91ac17873733afaa80f68cb309f016d5f217db8d08800e0a1bc1c4dbdd554f303c8e612cb39adca5c9485b509c8af480f5f1f82b5feecc20fe23e20d787285f72b5ceffd1bc1813dc51dd579882cddd5afd2a4a9d3036f4d490f351554f04b504af1e82183f4133b99597e0ea1b2412e2c2f6a9e337da3cbcc121238566295f85e8d9f2820f963fffa4dafd07794ff1ab13117808df91801f18f091b16671586944eb0c35eba0c3c73e24176f5c050662d207536155404b130e7577de847299f18f446c68414e326d8f28d46ec39f4da2ee6afefe68be704837b57eb617330c8144183cb73b3e653b509852fe25ce02541e28ccaec4ed6ae54ee89578e4d224713e1c15367e375c6005d474462232787547b901e4b8ce52bd471d00c48593a751043a950455353ed621cda39ec0d78f5bf117fe4f4e2955aa6ec1cfd0bd9fb124180f52de6e77fd217ec35a7eaf5a79662422519b535ad83d36dc348c43b167bfb2bbc905c34d831818abcfb17e110812d7b60e86b2ffd3fb8c52b5fc5359c55bc602b84c2610bf1c1cf769aa21a8274baf4792159e285e351d6d0a6e69ed0e7669acae1efd97b8eff1341ba2b44e35b970822186c89184a2eafb408867e9170a9bbf41707111961200af575f6bae3e1a0608e0cd3538c556314d39e3c1dc8e86143f1238cbd5b1a9e0f8016ee6f7cf547a1ba7aba3b3792f8b061ea4a2f5a1aeba643ff1d6b39eab632721ba635b3a3f4031d63ce20cea49379dfbe45988f9973af61946de776d978fef8f6beeabcc07affea01900ccf0158fe2484702c0834caf216a8ab5a9ebdc385a3b20dcf999868569fd1f35ae9dea6b089b5a711e3394279ca5c4d65e02e795f20cd38da110892d6b8c5106b3ef3f346659a5167114d0f8fa7148247d5c6871316c8eab9b59147b58b8b738f820a15a3dcef0d2711add1a9f295e3da204b01274f58d2c3737fb90a449ee45f26c59d342895ab77942e4d8029a50c7fc5b1a3acbd56bbc7adbe9f13592895aadde57432424bd88cb3416e3f88ae06365286a213e54b333b377a1979c47f1da5bf4da9a82b977d03f51043f7641934c777aa753a2757aa9a96873b61dc5853211c6ad10db05b63cfd5cc973bc9a177b247a69720c0cbf83972bd7f239f481f54ecf955cfe95969efb2d002fdca5eb57760850bdd2e07e15052491657bc02f68209f3ac4cdd31003016ac7a2aa906b56920e93cedf5ecd9cf9937b4d29715e83290b4a04a6c69267350214c3c27fd186458a110cd8051a8c95cd15e8f739bf718a27bb3a41122a1e5cbf7123de37273f2619af64b4bc6e4b5bd73f0f6c3a7ca905df3b8c56f1494e83e6faa769aa1d2bd90a84f5a2f4077bbf9c2a9ae6895d509bf7d77ce0c828b581d6a1ecb971c8aa09c9fb4eacde5655a006e35e761e1908b1aa45d73b9cbe903239d15e45bb4589933be60eb6357db615f8d19660fd0a34d11a6592943add53c0b3f423078e46a6c833c74c682a61546b1752d26489cf40408aaba6abffce9c121d40171472c057b6e8b09d5e6d7c9e6e5fa72bd78859aec0959356cc879373b6b3eef5956d96d306cbf251f688367b3d30aaf978e7826830eb4631bac3a8468680ce7166704fd5f0c08b299412b54e234ca20363eb80ae865b19f3451f07eb0fd27c474371ff695d5650056571ff13a7e344db20fd6cc5cd1074b8001f3d8c8ee00edba52100caabfd753d992a8efa5f1d146633bab0c11b084eeb5f580a88808085251c2ebdcaad047918e96f63b41ea651faa570bab0caab24291d9db0d7708d218287d44bcb0d71ccbaccc8c8e5c83dca85a823f137e5ed1f389810ece708fac0d430b1c5068feb452167ffe7582fbaa529c580e8f4852f76fb7125b33c8871fb5b5d54fd3478babbd9fb5f237203b3b4dc6f065d1c4c81833346c64dbbff729f1d6d6ac4c12977f935cc37213cdc3a69fccb2aafb899a3eccd57acb523d806a467939062b6e29a5d523e7a574f725e830865e8659e95861d89cf3aa1a07b336c8eb95f42f6a6d718ece3c3341d0fa147e80762ea1008882b1de87574f07e7f85ff7b8c43fed460ef5406cdac27100a2d385d03b439d5f6021c042b81b40c63d0d6e61540f65b2c0516e069e4a055a6798c5ecb9037e2683eca3b037dc0738fda2031ccafd0da6a1fd8e57be90cbeaf9c8dbcf47d51aa490e23bc16075cdcb2d5243fb54fda426ae2c22caf8cac732395b76d8e12610e676825e980b5693ec1976eab8e3ae2ce707e23d9c78b53436bd07169765dbeeebe81e776b9ef55abe511fa87b48fe05832903968b48c53b4c108f01a77afa5db8f0a8d60a99af1f0c05d717b11d177ec60f054f7c901203b2ad918f162d0a3318e410941fd06695cb275977b26302c7746236be74bc91ff0125f340702fe039c4a3de5647736fac0ee96dd55ae45f0ebfaea21a61ef0b2312978fed70df474da2aa2aa27bf0422a7ee7b83a8acd9a4fa512f962eb969b4f0be7744c266b3c751652f5a35f844e482c1edccfe5e34ed9e327da43c2a2725a3b86afb1d9e927cf15f222ff812f867fcbd8b41becdcf294f1f86975e3b005679e12918dee0866ad"}) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000009000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2928.049458][ T4832] jfs: Unrecognized mount option "permit_directiosmackfstransmute=" or missing value [ 2928.112409][T14619] usb 6-1: new high-speed USB device number 109 using dummy_hcd [ 2928.120416][ T4838] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.139755][ T4838] EXT4-fs (loop4): group descriptors corrupted! [ 2928.145215][ T4832] jfs: Unrecognized mount option "permit_directiosmackfstransmute=" or missing value [ 2928.183989][ T4838] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.194678][ T4838] EXT4-fs (loop4): group descriptors corrupted! 04:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000015000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2928.349147][ T4864] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.361163][ T4864] EXT4-fs (loop4): group descriptors corrupted! [ 2928.440646][ T4864] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.450821][ T4864] EXT4-fs (loop4): group descriptors corrupted! 04:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000016000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2928.484168][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2928.506133][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2928.523441][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2928.541057][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2928.554186][T14619] usb 6-1: config 0 descriptor?? [ 2928.573002][ T4874] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.583262][ T4874] EXT4-fs (loop4): group descriptors corrupted! [ 2928.625113][ T4874] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.635454][ T4874] EXT4-fs (loop4): group descriptors corrupted! 04:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000025000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000027000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2928.734060][ T4886] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.748621][ T4886] EXT4-fs (loop4): group descriptors corrupted! [ 2928.796399][ T4814] udc-core: couldn't find an available UDC or it's busy [ 2928.803802][ T4814] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100000003f000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2928.848956][ T4891] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.859684][ T4891] EXT4-fs (loop4): group descriptors corrupted! [ 2928.935245][ T4899] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2928.945497][ T4899] EXT4-fs (loop4): group descriptors corrupted! [ 2929.008544][ T4899] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2929.021794][ T4899] EXT4-fs (loop4): group descriptors corrupted! [ 2929.053649][T14619] keytouch 0003:0926:3333.00E0: fixing up Keytouch IEC report descriptor [ 2929.066788][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00E0/input/input153 [ 2929.155210][T14619] keytouch 0003:0926:3333.00E0: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2929.264045][ T1188] usb 6-1: USB disconnect, device number 109 04:39:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) socket(0x200000000000011, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1002000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:50 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x0, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2930.876928][ T4949] EXT4-fs (loop4): inodes count not valid: 528 vs 16 04:39:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./file0\x00', 0x42901, 0xe1) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f00000001c0)={&(0x7f0000000140)="66dee97595ded684c68657f1a2d118ed49dc8428cbe0a897a3234f7b8828f2fbcaedbc4177b85700a2c95b403253adb6207f566ef94c8c841de5b42c8b8d5910c9f39b4d71f377cd1147efe76812ae6e16c1e3b7f3b07daeec0d059d4e86d4d3094055", 0x63}) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:39:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00'}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1003000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2931.121459][T16152] usb 6-1: new high-speed USB device number 110 using dummy_hcd [ 2931.186578][ T4961] EXT4-fs (loop4): inodes count not valid: 784 vs 16 04:39:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1004000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2931.250156][ T4961] EXT4-fs (loop4): inodes count not valid: 784 vs 16 04:39:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1005000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2931.326870][ T4985] EXT4-fs (loop4): inodes count not valid: 1040 vs 16 04:39:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1006000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2931.402267][ T4991] EXT4-fs (loop4): inodes count not valid: 1296 vs 16 [ 2931.481421][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2931.492809][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2931.518994][T16152] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 04:39:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1007000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2931.537764][ T4996] EXT4-fs (loop4): inodes count not valid: 1552 vs 16 [ 2931.548630][T16152] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2931.560647][T16152] usb 6-1: config 0 descriptor?? [ 2931.614738][ T5004] EXT4-fs (loop4): inodes count not valid: 1808 vs 16 [ 2931.671954][ T5004] EXT4-fs (loop4): inodes count not valid: 1808 vs 16 04:39:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1008000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2931.760467][ T5015] EXT4-fs (loop4): inodes count not valid: 2064 vs 16 [ 2931.802362][ T4946] udc-core: couldn't find an available UDC or it's busy [ 2931.809466][ T4946] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2931.822060][ T5015] EXT4-fs (loop4): inodes count not valid: 2064 vs 16 [ 2932.061483][T16152] keytouch 0003:0926:3333.00E1: fixing up Keytouch IEC report descriptor [ 2932.070648][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00E1/input/input154 [ 2932.173835][T16152] keytouch 0003:0926:3333.00E1: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2932.269524][T16152] usb 6-1: USB disconnect, device number 110 04:39:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) socket(0x200000000000011, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1009000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:53 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x0, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2933.902436][ T5067] EXT4-fs (loop4): inodes count not valid: 2320 vs 16 04:39:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100a000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) socket(0x200000000000011, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {0x0, 0x4}, {}, {}, {0x1}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2934.170510][T14619] usb 6-1: new high-speed USB device number 111 using dummy_hcd [ 2934.225875][ T5080] EXT4-fs (loop4): inodes count not valid: 2576 vs 16 [ 2934.288333][ T5080] EXT4-fs (loop4): inodes count not valid: 2576 vs 16 04:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100b000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100c000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2934.371199][ T5099] EXT4-fs (loop4): inodes count not valid: 2832 vs 16 04:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100d000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2934.468160][ T5104] EXT4-fs (loop4): inodes count not valid: 3088 vs 16 [ 2934.550399][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2934.567742][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2934.580852][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2934.590775][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2934.599758][T14619] usb 6-1: config 0 descriptor?? [ 2934.605072][ T5109] EXT4-fs (loop4): inodes count not valid: 3344 vs 16 04:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100e000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100f000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2934.673545][ T5109] EXT4-fs (loop4): inodes count not valid: 3344 vs 16 [ 2934.792443][ T5123] EXT4-fs (loop4): inodes count not valid: 3856 vs 16 [ 2934.842039][ T5061] udc-core: couldn't find an available UDC or it's busy [ 2934.849168][ T5061] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2934.863642][ T5123] EXT4-fs (loop4): inodes count not valid: 3856 vs 16 [ 2935.090579][T14619] keytouch 0003:0926:3333.00E2: fixing up Keytouch IEC report descriptor [ 2935.103822][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00E2/input/input155 [ 2935.182745][T14619] keytouch 0003:0926:3333.00E2: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2935.296590][ T1188] usb 6-1: USB disconnect, device number 111 04:39:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1010000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:56 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2936.918890][ T5174] EXT4-fs (loop4): inodes count not valid: 4112 vs 16 04:39:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1011000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2937.005817][ T5191] EXT4-fs (loop4): inodes count not valid: 4368 vs 16 [ 2937.075864][ T5191] EXT4-fs (loop4): inodes count not valid: 4368 vs 16 04:39:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x20001) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1012000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000040), 0x4) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2937.189568][T14619] usb 6-1: new high-speed USB device number 112 using dummy_hcd [ 2937.265106][ T5207] EXT4-fs (loop4): inodes count not valid: 4624 vs 16 [ 2937.316756][ T5207] EXT4-fs (loop4): inodes count not valid: 4624 vs 16 04:39:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1014000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1025000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2937.404336][ T5222] EXT4-fs (loop4): inodes count not valid: 5136 vs 16 04:39:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="102e000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2937.470206][ T5227] EXT4-fs (loop4): inodes count not valid: 9488 vs 16 04:39:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1046000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2937.551766][ T5232] EXT4-fs (loop4): inodes count not valid: 11792 vs 16 [ 2937.590923][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2937.601942][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2937.613202][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2937.624574][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2937.636358][ T5236] EXT4-fs (loop4): inodes count not valid: 17936 vs 16 [ 2937.636650][T14619] usb 6-1: config 0 descriptor?? [ 2937.704469][ T5236] EXT4-fs (loop4): inodes count not valid: 17936 vs 16 [ 2937.890218][ T5181] udc-core: couldn't find an available UDC or it's busy [ 2937.897219][ T5181] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2938.129781][T14619] keytouch 0003:0926:3333.00E3: fixing up Keytouch IEC report descriptor [ 2938.148770][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00E3/input/input156 [ 2938.241347][T14619] keytouch 0003:0926:3333.00E3: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2938.339285][T14619] usb 6-1: USB disconnect, device number 112 04:39:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:39:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1048000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:39:59 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:39:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2939.932381][ T5295] EXT4-fs (loop4): inodes count not valid: 18448 vs 16 04:39:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="104c000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2939.978914][ T5295] EXT4-fs (loop4): inodes count not valid: 18448 vs 16 [ 2940.044782][ T5309] EXT4-fs (loop4): inodes count not valid: 19472 vs 16 [ 2940.105059][ T5309] EXT4-fs (loop4): inodes count not valid: 19472 vs 16 04:40:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="105c000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2940.208935][T18219] usb 6-1: new high-speed USB device number 113 using dummy_hcd 04:40:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='\x00\x00', 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0xf7}, 0x20) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2940.290072][ T5321] EXT4-fs (loop4): inodes count not valid: 23568 vs 16 04:40:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1060000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2940.362659][ T5321] EXT4-fs (loop4): inodes count not valid: 23568 vs 16 [ 2940.462832][ T5339] EXT4-fs (loop4): inodes count not valid: 24592 vs 16 [ 2940.505615][ T5339] EXT4-fs (loop4): inodes count not valid: 24592 vs 16 04:40:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1068000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2940.588252][ T5349] EXT4-fs (loop4): inodes count not valid: 26640 vs 16 [ 2940.608657][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2940.619703][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:40:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="106c000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2940.629727][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2940.641698][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2940.650607][T18219] usb 6-1: config 0 descriptor?? [ 2940.668651][ T5349] EXT4-fs (loop4): inodes count not valid: 26640 vs 16 [ 2940.756426][ T5361] EXT4-fs (loop4): inodes count not valid: 27664 vs 16 [ 2940.822779][ T5361] EXT4-fs (loop4): inodes count not valid: 27664 vs 16 04:40:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1074000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2940.891578][ T5292] udc-core: couldn't find an available UDC or it's busy [ 2940.907724][ T5292] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2940.954976][ T5372] EXT4-fs (loop4): inodes count not valid: 29712 vs 16 [ 2941.158863][T18219] keytouch 0003:0926:3333.00E4: fixing up Keytouch IEC report descriptor [ 2941.168301][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00E4/input/input157 [ 2941.259716][T18219] keytouch 0003:0926:3333.00E4: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2941.364056][T18219] usb 6-1: USB disconnect, device number 113 04:40:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="107a000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:02 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10fc000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2942.958821][ T5418] EXT4-fs (loop4): inodes count not valid: 31248 vs 16 [ 2943.075524][ T5432] EXT4-fs (loop4): inodes count not valid: 64528 vs 16 04:40:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="106a010040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:03 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2943.267757][T14619] usb 6-1: new high-speed USB device number 114 using dummy_hcd 04:40:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 04:40:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 2943.341204][ T5444] EXT4-fs (loop4): inodes count not valid: 92688 vs 16 [ 2943.414182][ T5444] EXT4-fs (loop4): inodes count not valid: 92688 vs 16 [ 2943.639615][T18219] usb 3-1: new high-speed USB device number 66 using dummy_hcd [ 2943.687603][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2943.698682][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2943.714814][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2943.727036][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2943.742143][T14619] usb 6-1: config 0 descriptor?? [ 2943.988666][ T5424] udc-core: couldn't find an available UDC or it's busy [ 2943.995727][ T5424] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2944.005052][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2944.015979][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2944.025968][T18219] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2944.035074][T18219] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2944.043835][T18219] usb 3-1: config 0 descriptor?? [ 2944.257879][T14619] keytouch 0003:0926:3333.00E5: fixing up Keytouch IEC report descriptor [ 2944.276976][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00E5/input/input158 [ 2944.291733][ T5458] udc-core: couldn't find an available UDC or it's busy [ 2944.300820][ T5458] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2944.359191][T14619] keytouch 0003:0926:3333.00E5: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2944.459768][ T1188] usb 6-1: USB disconnect, device number 114 [ 2944.547905][T18219] keytouch 0003:0926:3333.00E6: fixing up Keytouch IEC report descriptor [ 2944.559225][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00E6/input/input159 [ 2944.639009][T18219] keytouch 0003:0926:3333.00E6: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2944.755167][T32409] usb 3-1: USB disconnect, device number 66 04:40:04 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2945.267125][ T1188] usb 6-1: new high-speed USB device number 115 using dummy_hcd [ 2945.647020][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2945.657933][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2945.674172][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2945.686559][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2945.699891][ T1188] usb 6-1: config 0 descriptor?? [ 2945.937959][ T5563] udc-core: couldn't find an available UDC or it's busy [ 2945.945066][ T5563] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:40:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 04:40:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="106e010040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 04:40:05 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 04:40:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 04:40:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2946.079453][ T5587] EXT4-fs (loop4): inodes count not valid: 93712 vs 16 04:40:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2946.159764][ T5587] EXT4-fs (loop4): inodes count not valid: 93712 vs 16 [ 2946.186985][ T1188] keytouch 0003:0926:3333.00E7: fixing up Keytouch IEC report descriptor [ 2946.196570][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00E7/input/input160 [ 2946.298286][ T1188] keytouch 0003:0926:3333.00E7: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2946.310314][T18219] usb 3-1: new high-speed USB device number 67 using dummy_hcd [ 2946.396500][ T1188] usb 6-1: USB disconnect, device number 115 [ 2946.686764][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2946.699189][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2946.708975][T18219] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2946.720749][T18219] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2946.731340][T18219] usb 3-1: config 0 descriptor?? 04:40:06 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2946.968435][ T5583] udc-core: couldn't find an available UDC or it's busy [ 2946.975425][ T5583] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2947.186557][T16152] usb 6-1: new high-speed USB device number 116 using dummy_hcd [ 2947.227154][T18219] keytouch 0003:0926:3333.00E8: fixing up Keytouch IEC report descriptor [ 2947.239683][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00E8/input/input161 [ 2947.318377][T18219] keytouch 0003:0926:3333.00E8: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2947.445366][T32409] usb 3-1: USB disconnect, device number 67 [ 2947.556501][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2947.568498][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2947.581544][T16152] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2947.592194][T16152] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2947.604017][T16152] usb 6-1: config 0 descriptor?? [ 2947.857375][ T5654] udc-core: couldn't find an available UDC or it's busy [ 2947.864547][ T5654] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2948.096674][T16152] keytouch 0003:0926:3333.00E9: fixing up Keytouch IEC report descriptor [ 2948.117233][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00E9/input/input162 [ 2948.198061][T16152] keytouch 0003:0926:3333.00E9: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2948.299097][T32409] usb 6-1: USB disconnect, device number 116 04:40:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="106f010040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:08 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:08 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:08 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:08 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2949.081998][ T5756] EXT4-fs (loop4): inodes count not valid: 93968 vs 16 04:40:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:08 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:08 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1004020040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2949.153972][ T5769] ptrace attach of "/root/syz-executor.1"[5768] was attempted by "/root/syz-executor.1"[5769] [ 2949.165608][ T5756] EXT4-fs (loop4): inodes count not valid: 93968 vs 16 [ 2949.189100][ T5779] ptrace attach of "/root/syz-executor.3"[5773] was attempted by "/root/syz-executor.3"[5779] 04:40:09 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:09 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2949.252284][ T5790] EXT4-fs (loop4): inodes count not valid: 132112 vs 16 [ 2949.254516][ T5789] ptrace attach of "/root/syz-executor.1"[5785] was attempted by "/root/syz-executor.1"[5789] [ 2949.261738][ T5792] ptrace attach of "/root/syz-executor.3"[5787] was attempted by "/root/syz-executor.3"[5792] [ 2949.329580][ T5790] EXT4-fs (loop4): inodes count not valid: 132112 vs 16 [ 2949.335912][ T5807] ptrace attach of "/root/syz-executor.3"[5806] was attempted by "/root/syz-executor.3"[5807] [ 2949.349409][T14619] usb 6-1: new high-speed USB device number 117 using dummy_hcd [ 2949.357227][T32409] usb 3-1: new high-speed USB device number 68 using dummy_hcd [ 2949.765969][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2949.777241][T32409] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2949.788322][T32409] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2949.798072][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2949.809864][T32409] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2949.820267][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2949.829335][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2949.837533][T32409] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2949.849300][T14619] usb 6-1: config 0 descriptor?? [ 2949.855241][T32409] usb 3-1: config 0 descriptor?? [ 2950.096438][ T5752] udc-core: couldn't find an available UDC or it's busy [ 2950.103466][ T5752] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2950.105360][ T5754] udc-core: couldn't find an available UDC or it's busy [ 2950.119226][ T5754] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2950.336110][T14619] keytouch 0003:0926:3333.00EA: fixing up Keytouch IEC report descriptor [ 2950.355683][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00EA/input/input163 [ 2950.367729][T32409] keytouch 0003:0926:3333.00EB: fixing up Keytouch IEC report descriptor [ 2950.378711][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00EB/input/input164 [ 2950.458262][T14619] keytouch 0003:0926:3333.00EA: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2950.546489][T16152] usb 6-1: USB disconnect, device number 117 [ 2950.546573][T32409] keytouch 0003:0926:3333.00EB: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2950.636139][T32409] usb 3-1: USB disconnect, device number 68 04:40:10 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1090020040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:10 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0x0, 0x0, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2951.156636][ T5899] EXT4-fs (loop4): inodes count not valid: 167952 vs 16 [ 2951.164807][ T5907] ptrace attach of "/root/syz-executor.2"[5903] was attempted by "/root/syz-executor.2"[5907] 04:40:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1091020040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1010000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2951.231650][ T5899] EXT4-fs (loop4): inodes count not valid: 167952 vs 16 [ 2951.338233][ T5928] EXT4-fs (loop4): inodes count not valid: 168208 vs 16 [ 2951.408627][ T5927] EXT4-fs (loop2): inodes count not valid: 4112 vs 16 [ 2951.415771][ T5928] EXT4-fs (loop4): inodes count not valid: 168208 vs 16 [ 2951.429032][T18219] usb 6-1: new high-speed USB device number 118 using dummy_hcd [ 2951.815235][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2951.826119][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2951.842506][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2951.854762][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2951.863528][T18219] usb 6-1: config 0 descriptor?? [ 2952.106189][ T5900] udc-core: couldn't find an available UDC or it's busy [ 2952.113146][ T5900] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:40:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1095020040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2952.333697][ T5957] EXT4-fs (loop4): inodes count not valid: 169232 vs 16 [ 2952.355731][T18219] keytouch 0003:0926:3333.00EC: fixing up Keytouch IEC report descriptor 04:40:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000030040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2952.398347][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00EC/input/input165 [ 2952.483824][ T5977] EXT4-fs (loop4): inodes count not valid: 196624 vs 16 [ 2952.516641][T18219] keytouch 0003:0926:3333.00EC: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2952.558013][T18219] usb 6-1: USB disconnect, device number 118 04:40:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1091020040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:12 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0x0, 0x0, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1002040040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2953.108314][ T6027] EXT4-fs (loop4): inodes count not valid: 262672 vs 16 [ 2953.156310][ T6034] EXT4-fs (loop2): inodes count not valid: 168208 vs 16 [ 2953.183240][ T6027] EXT4-fs (loop4): inodes count not valid: 262672 vs 16 [ 2953.364723][T18219] usb 6-1: new high-speed USB device number 119 using dummy_hcd [ 2953.724783][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2953.735695][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2953.748560][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2953.758429][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2953.770654][T18219] usb 6-1: config 0 descriptor?? [ 2954.025757][ T6028] udc-core: couldn't find an available UDC or it's busy [ 2954.032841][ T6028] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2954.265197][T18219] keytouch 0003:0926:3333.00ED: fixing up Keytouch IEC report descriptor [ 2954.283416][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00ED/input/input166 [ 2954.365646][T18219] keytouch 0003:0926:3333.00ED: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2954.471021][T18219] usb 6-1: USB disconnect, device number 119 04:40:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1006040040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:15 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0x0, 0x0, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1010040040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2955.441027][ T6111] EXT4-fs (loop4): inodes count not valid: 263696 vs 16 04:40:15 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2955.541752][ T6131] EXT4-fs (loop4): inodes count not valid: 266256 vs 16 [ 2955.584909][ T6131] EXT4-fs (loop4): inodes count not valid: 266256 vs 16 04:40:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000050040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2955.694090][ T1188] usb 6-1: new high-speed USB device number 120 using dummy_hcd [ 2955.718303][ T6149] EXT4-fs (loop4): inodes count not valid: 327696 vs 16 [ 2955.825563][T18219] usb 3-1: new high-speed USB device number 69 using dummy_hcd [ 2956.114124][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2956.125085][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2956.138264][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2956.147366][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2956.159774][ T1188] usb 6-1: config 0 descriptor?? [ 2956.223998][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2956.238069][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2956.251239][T18219] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2956.260436][T18219] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2956.269143][T18219] usb 3-1: config 0 descriptor?? [ 2956.425751][ T6110] udc-core: couldn't find an available UDC or it's busy [ 2956.432738][ T6110] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2956.525642][ T6138] udc-core: couldn't find an available UDC or it's busy [ 2956.532767][ T6138] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2956.674313][ T1188] keytouch 0003:0926:3333.00EE: fixing up Keytouch IEC report descriptor [ 2956.687128][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00EE/input/input167 [ 2956.765291][ T1188] keytouch 0003:0926:3333.00EE: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2956.777861][T18219] keytouch 0003:0926:3333.00EF: fixing up Keytouch IEC report descriptor [ 2956.788145][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00EF/input/input168 [ 2956.887935][T18219] keytouch 0003:0926:3333.00EF: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2956.919163][T16152] usb 6-1: USB disconnect, device number 120 [ 2957.003813][T32409] usb 3-1: USB disconnect, device number 69 04:40:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000060040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:18 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:18 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1004060040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2958.463448][ T6239] EXT4-fs (loop4): inodes count not valid: 393232 vs 16 04:40:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 04:40:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 2958.554412][ T6252] EXT4-fs (loop4): inodes count not valid: 394256 vs 16 04:40:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 04:40:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2958.598703][ T6252] EXT4-fs (loop4): inodes count not valid: 394256 vs 16 [ 2958.703196][T18219] usb 3-1: new high-speed USB device number 70 using dummy_hcd [ 2958.733384][ T1188] usb 6-1: new high-speed USB device number 121 using dummy_hcd [ 2959.173101][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2959.184135][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2959.195102][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2959.214302][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2959.224199][T18219] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2959.233271][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2959.242325][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2959.250473][T18219] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2959.260687][T18219] usb 3-1: config 0 descriptor?? [ 2959.266751][ T1188] usb 6-1: config 0 descriptor?? [ 2959.503990][ T6238] udc-core: couldn't find an available UDC or it's busy [ 2959.506267][ T6235] udc-core: couldn't find an available UDC or it's busy [ 2959.510962][ T6238] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2959.528018][ T6235] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2959.743670][ T1188] keytouch 0003:0926:3333.00F0: fixing up Keytouch IEC report descriptor [ 2959.756420][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00F0/input/input169 [ 2959.769611][T18219] keytouch 0003:0926:3333.00F1: fixing up Keytouch IEC report descriptor [ 2959.781493][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00F1/input/input170 [ 2959.865017][ T1188] keytouch 0003:0926:3333.00F0: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2959.935595][T18219] keytouch 0003:0926:3333.00F1: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2959.948104][T14619] usb 6-1: USB disconnect, device number 121 [ 2959.990918][T18219] usb 3-1: USB disconnect, device number 70 04:40:20 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:20 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:40:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000070040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 2960.549654][ T6370] EXT4-fs (loop4): inodes count not valid: 458768 vs 16 [ 2960.618558][ T6370] EXT4-fs (loop4): inodes count not valid: 458768 vs 16 [ 2960.742709][ T1188] usb 6-1: new high-speed USB device number 122 using dummy_hcd [ 2960.822588][T16152] usb 3-1: new high-speed USB device number 71 using dummy_hcd [ 2961.153794][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2961.164793][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2961.178243][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2961.188196][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2961.198619][ T1188] usb 6-1: config 0 descriptor?? [ 2961.205296][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2961.217611][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2961.227428][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2961.239901][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2961.249879][T16152] usb 3-1: config 0 descriptor?? [ 2961.455669][ T6361] udc-core: couldn't find an available UDC or it's busy [ 2961.462923][ T6361] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2961.494058][ T6372] udc-core: couldn't find an available UDC or it's busy [ 2961.501222][ T6372] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:40:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x10, 0x3, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:40:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000090040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000a0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000b0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2961.611654][ T6403] EXT4-fs (loop4): inodes count not valid: 589840 vs 16 [ 2961.689440][ T6415] EXT4-fs (loop4): inodes count not valid: 720912 vs 16 [ 2961.692892][ T1188] keytouch 0003:0926:3333.00F2: fixing up Keytouch IEC report descriptor [ 2961.720571][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00F2/input/input171 04:40:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2961.736332][T16152] keytouch 0003:0926:3333.00F3: fixing up Keytouch IEC report descriptor [ 2961.747700][ T6415] EXT4-fs (loop4): inodes count not valid: 720912 vs 16 [ 2961.773800][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00F3/input/input172 [ 2961.813493][ T1188] keytouch 0003:0926:3333.00F2: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2961.875609][ T6441] EXT4-fs (loop4): inodes count not valid: 786448 vs 16 [ 2961.898373][T16152] keytouch 0003:0926:3333.00F3: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2961.898963][T14619] usb 6-1: USB disconnect, device number 122 [ 2961.968746][T14617] usb 3-1: USB disconnect, device number 71 [ 2961.993723][ T6441] EXT4-fs (loop4): inodes count not valid: 786448 vs 16 04:40:22 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x88, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000d0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2962.495215][ T6512] EXT4-fs (loop4): inodes count not valid: 851984 vs 16 04:40:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000e0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2962.556706][ T6516] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2962.570485][ T6512] EXT4-fs (loop4): inodes count not valid: 851984 vs 16 [ 2962.595096][ T6516] EXT4-fs (loop2): group descriptors corrupted! 04:40:22 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2962.692053][T16152] usb 6-1: new high-speed USB device number 123 using dummy_hcd [ 2962.705774][ T6529] EXT4-fs (loop4): inodes count not valid: 917520 vs 16 [ 2962.991994][ T1189] usb 3-1: new high-speed USB device number 72 using dummy_hcd [ 2963.052132][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2963.063078][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2963.073063][T16152] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2963.082320][T16152] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2963.093789][T16152] usb 6-1: config 0 descriptor?? [ 2963.334415][ T6505] udc-core: couldn't find an available UDC or it's busy [ 2963.341600][ T6505] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2963.362079][ T1189] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2963.373132][ T1189] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2963.382948][ T1189] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2963.393156][ T1189] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2963.403421][ T1189] usb 3-1: config 0 descriptor?? [ 2963.592290][T16152] keytouch 0003:0926:3333.00F4: fixing up Keytouch IEC report descriptor [ 2963.603756][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00F4/input/input173 [ 2963.683134][T16152] keytouch 0003:0926:3333.00F4: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2963.795325][T16152] usb 6-1: USB disconnect, device number 123 [ 2963.902142][ T1189] keytouch 0003:0926:3333.00F5: fixing up Keytouch IEC report descriptor [ 2963.913606][ T1189] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00F5/input/input174 [ 2964.003097][ T1189] keytouch 0003:0926:3333.00F5: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2964.120378][T14619] usb 3-1: USB disconnect, device number 72 04:40:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000f0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:24 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x0, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:40:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:24 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2964.620681][ T6631] EXT4-fs (loop4): inodes count not valid: 983056 vs 16 04:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1004100040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2964.689672][ T6631] EXT4-fs (loop4): inodes count not valid: 983056 vs 16 04:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020100040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000110040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2964.825235][ T6659] EXT4-fs (loop4): inodes count not valid: 1056784 vs 16 [ 2964.891478][T14619] usb 6-1: new high-speed USB device number 124 using dummy_hcd [ 2964.904323][ T6666] EXT4-fs (loop4): inodes count not valid: 1114128 vs 16 04:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000120040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2964.973817][ T6666] EXT4-fs (loop4): inodes count not valid: 1114128 vs 16 [ 2965.001407][T16152] usb 3-1: new high-speed USB device number 73 using dummy_hcd [ 2965.065061][ T6676] EXT4-fs (loop4): inodes count not valid: 1179664 vs 16 04:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000140040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2965.110489][ T6676] EXT4-fs (loop4): inodes count not valid: 1179664 vs 16 [ 2965.193244][ T6685] EXT4-fs (loop4): inodes count not valid: 1310736 vs 16 [ 2965.235757][ T6685] EXT4-fs (loop4): inodes count not valid: 1310736 vs 16 [ 2965.261467][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2965.272508][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:40:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000200040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2965.285628][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2965.296062][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2965.306932][T14619] usb 6-1: config 0 descriptor?? [ 2965.355941][ T6696] EXT4-fs (loop4): inodes count not valid: 2097168 vs 16 [ 2965.412600][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2965.441420][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2965.460788][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2965.476517][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2965.489608][T16152] usb 3-1: config 0 descriptor?? [ 2965.553702][ T6635] udc-core: couldn't find an available UDC or it's busy [ 2965.561249][ T6635] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2965.791684][T14619] keytouch 0003:0926:3333.00F6: fixing up Keytouch IEC report descriptor [ 2965.804057][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00F6/input/input175 [ 2965.893423][T14619] keytouch 0003:0926:3333.00F6: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2965.981556][T16152] keytouch 0003:0926:3333.00F7: fixing up Keytouch IEC report descriptor [ 2965.999621][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00F7/input/input176 [ 2966.023634][ T1188] usb 6-1: USB disconnect, device number 124 [ 2966.094205][T16152] keytouch 0003:0926:3333.00F7: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2966.195257][T14619] usb 3-1: USB disconnect, device number 73 04:40:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1010200040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:27 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x0, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:27 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:40:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2967.691526][ T6779] EXT4-fs (loop4): inodes count not valid: 2101264 vs 16 04:40:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000250040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2967.768773][ T6779] EXT4-fs (loop4): inodes count not valid: 2101264 vs 16 [ 2967.834787][ T6803] EXT4-fs (loop4): inodes count not valid: 2424848 vs 16 [ 2967.889933][ T6803] EXT4-fs (loop4): inodes count not valid: 2424848 vs 16 04:40:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10002e0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10003f0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2967.961133][T16152] usb 3-1: new high-speed USB device number 74 using dummy_hcd [ 2967.968797][ T1188] usb 6-1: new high-speed USB device number 125 using dummy_hcd [ 2967.996893][ T6813] EXT4-fs (loop4): inodes count not valid: 3014672 vs 16 [ 2968.103285][ T6819] EXT4-fs (loop4): inodes count not valid: 4128784 vs 16 04:40:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000400040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2968.157689][ T6819] EXT4-fs (loop4): inodes count not valid: 4128784 vs 16 04:40:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000460040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2968.225213][ T6829] EXT4-fs (loop4): inodes count not valid: 4194320 vs 16 [ 2968.313202][ T6834] EXT4-fs (loop4): inodes count not valid: 4587536 vs 16 04:40:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000480040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2968.358631][ T6834] EXT4-fs (loop4): inodes count not valid: 4587536 vs 16 [ 2968.374710][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2968.385736][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2968.398522][ T1188] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2968.419755][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2968.437085][ T1188] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2968.450725][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2968.459739][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2968.473706][ T6842] EXT4-fs (loop4): inodes count not valid: 4718608 vs 16 [ 2968.479270][ T1188] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2968.491255][ T1188] usb 6-1: config 0 descriptor?? [ 2968.518352][T16152] usb 3-1: config 0 descriptor?? [ 2968.741251][ T6778] udc-core: couldn't find an available UDC or it's busy [ 2968.748438][ T6778] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2968.783010][ T6783] udc-core: couldn't find an available UDC or it's busy [ 2968.789975][ T6783] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2968.980989][ T1188] keytouch 0003:0926:3333.00F8: fixing up Keytouch IEC report descriptor [ 2968.998696][ T1188] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00F8/input/input177 [ 2969.050735][T16152] keytouch 0003:0926:3333.00F9: fixing up Keytouch IEC report descriptor [ 2969.064699][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00F9/input/input178 [ 2969.092391][ T1188] keytouch 0003:0926:3333.00F8: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2969.174044][T16152] keytouch 0003:0926:3333.00F9: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2969.199579][T16152] usb 6-1: USB disconnect, device number 125 [ 2969.265930][T14617] usb 3-1: USB disconnect, device number 74 04:40:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10004c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:30 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x0, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:30 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x0, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:40:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2970.744531][ T6937] EXT4-fs (loop4): inodes count not valid: 4980752 vs 16 [ 2970.820372][ T6937] EXT4-fs (loop4): inodes count not valid: 4980752 vs 16 04:40:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10005c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2970.926522][ T6955] EXT4-fs (loop4): inodes count not valid: 6029328 vs 16 04:40:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000600040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2970.983435][ T6955] EXT4-fs (loop4): inodes count not valid: 6029328 vs 16 [ 2971.009727][T14619] usb 6-1: new high-speed USB device number 126 using dummy_hcd [ 2971.017387][T14617] usb 3-1: new high-speed USB device number 75 using dummy_hcd [ 2971.073896][ T6965] EXT4-fs (loop4): inodes count not valid: 6291472 vs 16 04:40:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000680040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2971.129745][ T6965] EXT4-fs (loop4): inodes count not valid: 6291472 vs 16 [ 2971.201264][ T6975] EXT4-fs (loop4): inodes count not valid: 6815760 vs 16 [ 2971.244895][ T6975] EXT4-fs (loop4): inodes count not valid: 6815760 vs 16 04:40:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10016a0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10006c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2971.332350][ T6985] EXT4-fs (loop4): inodes count not valid: 6947088 vs 16 04:40:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10016e0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2971.405655][ T6991] EXT4-fs (loop4): inodes count not valid: 7077904 vs 16 [ 2971.429757][T14617] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2971.440881][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2971.451850][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2971.463061][T14617] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2971.474488][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2971.485422][T14617] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2971.494523][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2971.502603][T14617] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2971.513715][T14619] usb 6-1: config 0 descriptor?? [ 2971.521185][T14617] usb 3-1: config 0 descriptor?? [ 2971.544053][ T6999] EXT4-fs (loop4): inodes count not valid: 7209232 vs 16 [ 2971.615420][ T6999] EXT4-fs (loop4): inodes count not valid: 7209232 vs 16 [ 2971.782438][ T6931] udc-core: couldn't find an available UDC or it's busy [ 2971.789781][ T6931] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2971.791372][ T6933] udc-core: couldn't find an available UDC or it's busy [ 2971.820690][ T6933] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2972.029913][T14619] keytouch 0003:0926:3333.00FA: fixing up Keytouch IEC report descriptor [ 2972.039079][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00FA/input/input179 [ 2972.069832][T14617] keytouch 0003:0926:3333.00FB: fixing up Keytouch IEC report descriptor [ 2972.079374][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00FB/input/input180 [ 2972.120781][T14619] keytouch 0003:0926:3333.00FA: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2972.212615][T14617] keytouch 0003:0926:3333.00FB: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2972.240974][T14617] usb 6-1: USB disconnect, device number 126 [ 2972.294296][T32409] usb 3-1: USB disconnect, device number 75 04:40:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10016f0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:33 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x0, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:33 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x0, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:40:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2973.787333][ T7101] EXT4-fs (loop4): inodes count not valid: 7274768 vs 16 04:40:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000740040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2973.841009][ T7101] EXT4-fs (loop4): inodes count not valid: 7274768 vs 16 [ 2973.921017][ T7115] EXT4-fs (loop4): inodes count not valid: 7602192 vs 16 [ 2973.965629][ T7115] EXT4-fs (loop4): inodes count not valid: 7602192 vs 16 04:40:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10007a0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2974.028895][ T1189] usb 3-1: new high-speed USB device number 76 using dummy_hcd [ 2974.048909][T16152] usb 6-1: new high-speed USB device number 127 using dummy_hcd [ 2974.065390][ T7126] EXT4-fs (loop4): inodes count not valid: 7995408 vs 16 04:40:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1002900040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1002910040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2974.156141][ T7132] EXT4-fs (loop4): inodes count not valid: 9437712 vs 16 04:40:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1002950040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2974.232982][ T7138] EXT4-fs (loop4): inodes count not valid: 9503248 vs 16 [ 2974.315674][ T7144] EXT4-fs (loop4): inodes count not valid: 9765392 vs 16 [ 2974.384529][ T7144] EXT4-fs (loop4): inodes count not valid: 9765392 vs 16 [ 2974.402868][ T1189] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2974.413978][ T1189] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2974.427544][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2974.448806][ T1189] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2974.457843][ T1189] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2974.470247][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:40:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000fc0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2974.488473][T16152] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2974.503890][ T1189] usb 3-1: config 0 descriptor?? [ 2974.519489][T16152] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2974.528447][T16152] usb 6-1: config 0 descriptor?? [ 2974.550124][ T7156] EXT4-fs (loop4): inodes count not valid: 16515088 vs 16 [ 2974.610206][ T7156] EXT4-fs (loop4): inodes count not valid: 16515088 vs 16 [ 2974.760657][ T7090] udc-core: couldn't find an available UDC or it's busy [ 2974.767772][ T7090] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2974.784191][ T7099] udc-core: couldn't find an available UDC or it's busy [ 2974.791254][ T7099] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2975.039179][T16152] keytouch 0003:0926:3333.00FC: fixing up Keytouch IEC report descriptor [ 2975.048111][ T1189] keytouch 0003:0926:3333.00FD: fixing up Keytouch IEC report descriptor [ 2975.068863][ T1189] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00FD/input/input181 [ 2975.081011][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00FC/input/input182 [ 2975.160594][ T1189] keytouch 0003:0926:3333.00FD: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2975.231423][T16152] keytouch 0003:0926:3333.00FC: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2975.263499][T14617] usb 3-1: USB disconnect, device number 76 [ 2975.269697][T16152] usb 6-1: USB disconnect, device number 127 04:40:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100fff0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:36 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x0, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:36 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x0, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2976.826509][ T7254] EXT4-fs (loop4): inodes count not valid: 16715536 vs 16 [ 2976.882601][ T7254] EXT4-fs (loop4): inodes count not valid: 16715536 vs 16 04:40:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000046000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100000005e000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2976.987689][ T7275] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2976.999605][ T7275] EXT4-fs (loop4): group descriptors corrupted! [ 2977.072287][ T7280] EXT4-fs (loop4): bad geometry: block count 94 exceeds size of device (70 blocks) [ 2977.078141][T14617] usb 3-1: new high-speed USB device number 77 using dummy_hcd [ 2977.095830][T16152] usb 6-1: new high-speed USB device number 2 using dummy_hcd 04:40:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="107fffffff000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2977.144469][ T7280] EXT4-fs (loop4): bad geometry: block count 94 exceeds size of device (70 blocks) 04:40:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000020040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2977.215942][ T7290] EXT4-fs (loop4): bad geometry: block count 255 exceeds size of device (70 blocks) 04:40:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000030040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2977.296400][ T7295] EXT4-fs (loop4): inodes count not valid: 131088 vs 16 04:40:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000040040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2977.362178][ T7301] EXT4-fs (loop4): inodes count not valid: 196624 vs 16 [ 2977.400244][ T7301] EXT4-fs (loop4): inodes count not valid: 196624 vs 16 [ 2977.458152][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2977.469482][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2977.487188][ T7311] EXT4-fs (loop4): inodes count not valid: 262160 vs 16 [ 2977.487408][T16152] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2977.494286][T14617] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2977.503341][T16152] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2977.524403][T16152] usb 6-1: config 0 descriptor?? [ 2977.543629][T14617] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2977.567131][T14617] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2977.580950][ T7311] EXT4-fs (loop4): inodes count not valid: 262160 vs 16 [ 2977.605960][T14617] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2977.631551][T14617] usb 3-1: config 0 descriptor?? [ 2977.777255][ T7255] udc-core: couldn't find an available UDC or it's busy [ 2977.787306][ T7255] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2977.909579][ T7249] udc-core: couldn't find an available UDC or it's busy [ 2977.916578][ T7249] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2978.028215][T16152] keytouch 0003:0926:3333.00FE: fixing up Keytouch IEC report descriptor [ 2978.037577][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.00FE/input/input183 [ 2978.119199][T16152] keytouch 0003:0926:3333.00FE: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2978.159863][T14617] keytouch 0003:0926:3333.00FF: fixing up Keytouch IEC report descriptor [ 2978.189807][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.00FF/input/input184 [ 2978.232280][T14619] usb 6-1: USB disconnect, device number 2 [ 2978.301570][T14617] keytouch 0003:0926:3333.00FF: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2978.379872][T16152] usb 3-1: USB disconnect, device number 77 04:40:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000050040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:39 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x0, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:39 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x0, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2979.869127][ T7408] EXT4-fs (loop4): inodes count not valid: 327696 vs 16 04:40:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000060040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2979.946346][ T7408] EXT4-fs (loop4): inodes count not valid: 327696 vs 16 04:40:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000070040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2980.026609][ T7431] EXT4-fs (loop4): inodes count not valid: 393232 vs 16 [ 2980.097305][T16152] usb 3-1: new high-speed USB device number 78 using dummy_hcd [ 2980.112181][ T7437] EXT4-fs (loop4): inodes count not valid: 458768 vs 16 04:40:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000080040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2980.147346][T14619] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 2980.173237][ T7437] EXT4-fs (loop4): inodes count not valid: 458768 vs 16 [ 2980.245969][ T7446] EXT4-fs (loop4): inodes count not valid: 524304 vs 16 04:40:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000090040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2980.294522][ T7446] EXT4-fs (loop4): inodes count not valid: 524304 vs 16 04:40:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000a0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2980.375126][ T7456] EXT4-fs (loop4): inodes count not valid: 589840 vs 16 04:40:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000b0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2980.477377][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2980.492640][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2980.511787][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2980.526912][ T7466] EXT4-fs (loop4): inodes count not valid: 720912 vs 16 [ 2980.534345][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2980.551376][T16152] usb 3-1: config 0 descriptor?? [ 2980.560592][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2980.584203][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2980.599918][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2980.613887][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2980.636623][T14619] usb 6-1: config 0 descriptor?? [ 2980.789111][ T7405] udc-core: couldn't find an available UDC or it's busy [ 2980.796091][ T7405] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2980.878406][ T7417] udc-core: couldn't find an available UDC or it's busy [ 2980.885409][ T7417] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2981.027493][T16152] keytouch 0003:0926:3333.0100: fixing up Keytouch IEC report descriptor [ 2981.046210][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0100/input/input185 [ 2981.117485][T14619] keytouch 0003:0926:3333.0101: fixing up Keytouch IEC report descriptor [ 2981.133636][T16152] keytouch 0003:0926:3333.0100: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2981.181468][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0101/input/input186 [ 2981.250365][T14617] usb 3-1: USB disconnect, device number 78 [ 2981.280635][T14619] keytouch 0003:0926:3333.0101: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2981.345662][T14619] usb 6-1: USB disconnect, device number 3 04:40:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:42 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) write$hidraw(0xffffffffffffffff, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:42 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x0, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2982.856012][ T7550] EXT4-fs (loop4): inodes count not valid: 786448 vs 16 04:40:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000d0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2982.913040][ T7550] EXT4-fs (loop4): inodes count not valid: 786448 vs 16 04:40:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000e0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2983.011066][ T7573] EXT4-fs (loop4): inodes count not valid: 851984 vs 16 04:40:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000f0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2983.061706][ T7581] EXT4-fs (loop4): inodes count not valid: 917520 vs 16 [ 2983.089168][ T7581] EXT4-fs (loop4): inodes count not valid: 917520 vs 16 [ 2983.136467][T16152] usb 3-1: new high-speed USB device number 79 using dummy_hcd [ 2983.158954][T14619] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 2983.175707][ T7590] EXT4-fs (loop4): inodes count not valid: 983056 vs 16 [ 2983.218554][ T7590] EXT4-fs (loop4): inodes count not valid: 983056 vs 16 04:40:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000100040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000110040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2983.324053][ T7601] EXT4-fs (loop4): inodes count not valid: 1048592 vs 16 [ 2983.416813][ T7606] EXT4-fs (loop4): inodes count not valid: 1114128 vs 16 [ 2983.460988][ T7606] EXT4-fs (loop4): inodes count not valid: 1114128 vs 16 [ 2983.496377][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2983.508071][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2983.521444][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2983.531030][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2983.554118][T16152] usb 3-1: config 0 descriptor?? 04:40:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000120040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2983.566483][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2983.601480][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2983.617843][ T7617] EXT4-fs (loop4): inodes count not valid: 1179664 vs 16 [ 2983.626304][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2983.635523][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2983.645500][T14619] usb 6-1: config 0 descriptor?? [ 2983.689020][ T7617] EXT4-fs (loop4): inodes count not valid: 1179664 vs 16 [ 2983.808165][ T7554] udc-core: couldn't find an available UDC or it's busy [ 2983.815245][ T7554] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2983.888325][ T7551] udc-core: couldn't find an available UDC or it's busy [ 2983.896072][ T7551] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2984.066744][T16152] keytouch 0003:0926:3333.0102: fixing up Keytouch IEC report descriptor [ 2984.079756][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0102/input/input187 [ 2984.126669][T14619] keytouch 0003:0926:3333.0103: fixing up Keytouch IEC report descriptor [ 2984.139503][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0103/input/input188 [ 2984.159427][T16152] keytouch 0003:0926:3333.0102: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2984.228775][T14619] keytouch 0003:0926:3333.0103: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2984.284339][T14619] usb 3-1: USB disconnect, device number 79 [ 2984.328472][T16152] usb 6-1: USB disconnect, device number 4 04:40:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000140040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:45 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x0, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:45 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x0, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2985.934541][ T7706] EXT4-fs (loop4): inodes count not valid: 1310736 vs 16 04:40:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000250040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2986.005200][ T7706] EXT4-fs (loop4): inodes count not valid: 1310736 vs 16 04:40:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10002e0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2986.073879][ T7731] EXT4-fs (loop4): inodes count not valid: 2424848 vs 16 [ 2986.117315][ T7737] EXT4-fs (loop4): inodes count not valid: 3014672 vs 16 [ 2986.163723][ T7737] EXT4-fs (loop4): inodes count not valid: 3014672 vs 16 04:40:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000460040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2986.205639][T14619] usb 3-1: new high-speed USB device number 80 using dummy_hcd [ 2986.213243][T32409] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 2986.268183][ T7747] EXT4-fs (loop4): inodes count not valid: 4587536 vs 16 04:40:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000480040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2986.336791][ T7747] EXT4-fs (loop4): inodes count not valid: 4587536 vs 16 04:40:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10004c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2986.433608][ T7756] EXT4-fs (loop4): inodes count not valid: 4718608 vs 16 04:40:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10005c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2986.492535][ T7761] EXT4-fs (loop4): inodes count not valid: 4980752 vs 16 [ 2986.571525][ T7766] EXT4-fs (loop4): inodes count not valid: 6029328 vs 16 [ 2986.577318][T14619] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2986.589579][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2986.603468][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2986.613216][T14619] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2986.624222][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2986.639564][T14619] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2986.644721][ T7766] EXT4-fs (loop4): inodes count not valid: 6029328 vs 16 [ 2986.649308][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 04:40:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000600040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2986.665712][T14619] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2986.679428][T32409] usb 6-1: config 0 descriptor?? [ 2986.685314][T14619] usb 3-1: config 0 descriptor?? [ 2986.734688][ T7778] EXT4-fs (loop4): inodes count not valid: 6291472 vs 16 [ 2986.804027][ T7778] EXT4-fs (loop4): inodes count not valid: 6291472 vs 16 [ 2986.926592][ T7709] udc-core: couldn't find an available UDC or it's busy [ 2986.933677][ T7709] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2986.944397][ T7711] udc-core: couldn't find an available UDC or it's busy [ 2986.953057][ T7711] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2987.185959][T14619] keytouch 0003:0926:3333.0104: fixing up Keytouch IEC report descriptor [ 2987.195062][T32409] keytouch 0003:0926:3333.0105: fixing up Keytouch IEC report descriptor [ 2987.207081][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0104/input/input190 [ 2987.208492][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0105/input/input189 [ 2987.297293][T32409] keytouch 0003:0926:3333.0105: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2987.368707][T14619] keytouch 0003:0926:3333.0104: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2987.409210][T16152] usb 6-1: USB disconnect, device number 5 [ 2987.431104][T14619] usb 3-1: USB disconnect, device number 80 04:40:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000680040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:48 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x0, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:40:48 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x0, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2988.960743][ T7860] EXT4-fs (loop4): inodes count not valid: 6815760 vs 16 [ 2989.030365][ T7860] EXT4-fs (loop4): inodes count not valid: 6815760 vs 16 04:40:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10006c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2989.117241][ T7888] EXT4-fs (loop4): inodes count not valid: 7077904 vs 16 04:40:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000740040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2989.178001][ T7888] EXT4-fs (loop4): inodes count not valid: 7077904 vs 16 [ 2989.224938][T16152] usb 3-1: new high-speed USB device number 81 using dummy_hcd [ 2989.264985][T32409] usb 6-1: new high-speed USB device number 6 using dummy_hcd [ 2989.289589][ T7897] EXT4-fs (loop4): inodes count not valid: 7602192 vs 16 04:40:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10007a0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000fc0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2989.387239][ T7903] EXT4-fs (loop4): inodes count not valid: 7995408 vs 16 [ 2989.467574][ T7910] EXT4-fs (loop4): inodes count not valid: 16515088 vs 16 04:40:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10006a0140000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2989.519543][ T7910] EXT4-fs (loop4): inodes count not valid: 16515088 vs 16 [ 2989.594923][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2989.606010][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2989.620112][ T7920] EXT4-fs (loop4): inodes count not valid: 23724048 vs 16 [ 2989.620357][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2989.627524][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2989.636316][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2989.655848][T16152] usb 3-1: config 0 descriptor?? [ 2989.689083][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2989.700275][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2989.722069][ T7920] EXT4-fs (loop4): inodes count not valid: 23724048 vs 16 04:40:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10006e0140000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2989.746033][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2989.762279][T32409] usb 6-1: config 0 descriptor?? 04:40:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10006f0140000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2989.819099][ T7934] EXT4-fs (loop4): inodes count not valid: 23986192 vs 16 [ 2989.906719][ T7863] udc-core: couldn't find an available UDC or it's busy [ 2989.914338][ T7863] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2989.921020][ T7939] EXT4-fs (loop4): inodes count not valid: 24051728 vs 16 [ 2990.005665][ T7874] udc-core: couldn't find an available UDC or it's busy [ 2990.014703][ T7874] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2990.155098][T16152] keytouch 0003:0926:3333.0106: fixing up Keytouch IEC report descriptor [ 2990.164422][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0106/input/input191 [ 2990.264964][T32409] keytouch 0003:0926:3333.0107: fixing up Keytouch IEC report descriptor [ 2990.265762][T16152] keytouch 0003:0926:3333.0106: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2990.299092][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0107/input/input192 [ 2990.394248][T14619] usb 3-1: USB disconnect, device number 81 [ 2990.414137][T32409] keytouch 0003:0926:3333.0107: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2990.489597][T32409] usb 6-1: USB disconnect, device number 6 04:40:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000040240000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2991.973294][ T8011] EXT4-fs (loop4): inodes count not valid: 33816592 vs 16 04:40:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000004800010100000000000000800a00e6"], 0x1c}}, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:40:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10006c0040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:51 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0x0, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000900240000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2992.019784][ T8011] EXT4-fs (loop4): inodes count not valid: 33816592 vs 16 [ 2992.057069][ T8028] EXT4-fs (loop2): inodes count not valid: 7077904 vs 16 04:40:51 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x0, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 2992.195803][ T8043] EXT4-fs (loop4): inodes count not valid: 42991632 vs 16 04:40:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000910240000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2992.267687][ T8043] EXT4-fs (loop4): inodes count not valid: 42991632 vs 16 [ 2992.340869][ T8056] EXT4-fs (loop4): inodes count not valid: 43057168 vs 16 [ 2992.348122][T32409] usb 6-1: new high-speed USB device number 7 using dummy_hcd 04:40:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000950240000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2992.412771][ T8056] EXT4-fs (loop4): inodes count not valid: 43057168 vs 16 04:40:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000340000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2992.494023][T16152] usb 3-1: new high-speed USB device number 82 using dummy_hcd [ 2992.505557][ T8066] EXT4-fs (loop4): inodes count not valid: 43319312 vs 16 [ 2992.604087][ T8072] EXT4-fs (loop4): inodes count not valid: 50331664 vs 16 [ 2992.655574][ T8072] EXT4-fs (loop4): inodes count not valid: 50331664 vs 16 04:40:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000020440000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2992.714099][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2992.737673][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2992.749576][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2992.760796][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2992.775848][T32409] usb 6-1: config 0 descriptor?? [ 2992.806380][ T8085] EXT4-fs (loop4): inodes count not valid: 67239952 vs 16 [ 2992.855812][ T8085] EXT4-fs (loop4): inodes count not valid: 67239952 vs 16 [ 2992.903949][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2992.920178][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2992.934978][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2992.947763][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2992.961021][T16152] usb 3-1: config 0 descriptor?? [ 2993.034756][ T8032] udc-core: couldn't find an available UDC or it's busy [ 2993.041726][ T8032] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2993.205442][ T8048] udc-core: couldn't find an available UDC or it's busy [ 2993.212489][ T8048] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2993.294247][T32409] keytouch 0003:0926:3333.0108: fixing up Keytouch IEC report descriptor [ 2993.303714][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0108/input/input193 [ 2993.395950][T32409] keytouch 0003:0926:3333.0108: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2993.444267][T16152] keytouch 0003:0926:3333.0109: fixing up Keytouch IEC report descriptor [ 2993.457012][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0109/input/input194 [ 2993.501578][ T1189] usb 6-1: USB disconnect, device number 7 [ 2993.574374][T16152] keytouch 0003:0926:3333.0109: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2993.658015][T16152] usb 3-1: USB disconnect, device number 82 04:40:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000060440000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2995.024795][ T8179] EXT4-fs (loop4): inodes count not valid: 67502096 vs 16 04:40:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:40:54 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0x0, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:54 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) write$hidraw(0xffffffffffffffff, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000100440000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2995.078014][ T8179] EXT4-fs (loop4): inodes count not valid: 67502096 vs 16 04:40:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000540000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2995.179956][ T8208] EXT4-fs (loop4): inodes count not valid: 68157456 vs 16 [ 2995.250236][ T8213] EXT4-fs (loop4): inodes count not valid: 83886096 vs 16 [ 2995.309856][ T8213] EXT4-fs (loop4): inodes count not valid: 83886096 vs 16 04:40:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000640000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2995.363262][T16152] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 2995.397032][ T8224] EXT4-fs (loop4): inodes count not valid: 100663312 vs 16 04:40:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000040640000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2995.413285][T32409] usb 3-1: new high-speed USB device number 83 using dummy_hcd 04:40:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000740000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2995.471726][ T8230] EXT4-fs (loop4): inodes count not valid: 100925456 vs 16 [ 2995.563035][ T8235] EXT4-fs (loop4): inodes count not valid: 117440528 vs 16 04:40:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000940000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2995.625030][ T8235] EXT4-fs (loop4): inodes count not valid: 117440528 vs 16 [ 2995.710675][ T8245] EXT4-fs (loop4): inodes count not valid: 150994960 vs 16 [ 2995.733274][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2995.744259][T16152] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2995.754038][T16152] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2995.763871][T16152] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2995.778605][T16152] usb 6-1: config 0 descriptor?? [ 2995.788925][ T8245] EXT4-fs (loop4): inodes count not valid: 150994960 vs 16 [ 2995.813284][T32409] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2995.824566][T32409] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2995.834918][T32409] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2995.853188][T32409] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2995.873495][T32409] usb 3-1: config 0 descriptor?? [ 2996.025359][ T8196] udc-core: couldn't find an available UDC or it's busy [ 2996.032426][ T8196] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2996.114905][ T8200] udc-core: couldn't find an available UDC or it's busy [ 2996.121970][ T8200] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2996.283537][T16152] keytouch 0003:0926:3333.010A: fixing up Keytouch IEC report descriptor [ 2996.294941][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.010A/input/input195 [ 2996.353511][T32409] keytouch 0003:0926:3333.010B: fixing up Keytouch IEC report descriptor [ 2996.367169][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.010B/input/input196 [ 2996.385702][T16152] keytouch 0003:0926:3333.010A: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2996.455802][T32409] keytouch 0003:0926:3333.010B: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2996.496873][T32409] usb 6-1: USB disconnect, device number 8 [ 2996.561269][T16152] usb 3-1: USB disconnect, device number 83 04:40:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000a40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:40:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2998.030578][ T8333] EXT4-fs (loop4): inodes count not valid: 167772176 vs 16 04:40:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:40:57 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0x0, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:57 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:40:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000b40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 2998.093987][ T8333] EXT4-fs (loop4): inodes count not valid: 167772176 vs 16 04:40:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:40:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:40:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:40:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2998.175735][ T8362] ptrace attach of "/root/syz-executor.0"[8357] was attempted by "/root/syz-executor.0"[8362] [ 2998.203969][ T8367] ptrace attach of "/root/syz-executor.0"[8366] was attempted by "/root/syz-executor.0"[8367] [ 2998.204362][ T8356] EXT4-fs (loop4): inodes count not valid: 184549392 vs 16 04:40:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 2998.250033][ T8375] ptrace attach of "/root/syz-executor.0"[8374] was attempted by "/root/syz-executor.0"[8375] [ 2998.452488][T32409] usb 6-1: new high-speed USB device number 9 using dummy_hcd [ 2998.502494][T16152] usb 3-1: new high-speed USB device number 84 using dummy_hcd [ 2998.832451][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2998.843505][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2998.855034][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2998.864363][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2998.864383][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2998.884145][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2998.885556][T32409] usb 6-1: config 0 descriptor?? [ 2998.894007][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 2998.917848][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2998.934370][T16152] usb 3-1: config 0 descriptor?? [ 2999.133261][ T8352] udc-core: couldn't find an available UDC or it's busy [ 2999.140335][ T8352] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2999.185664][ T8359] udc-core: couldn't find an available UDC or it's busy [ 2999.192711][ T8359] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2999.362749][T32409] keytouch 0003:0926:3333.010C: fixing up Keytouch IEC report descriptor [ 2999.375245][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.010C/input/input197 [ 2999.422829][T16152] keytouch 0003:0926:3333.010D: fixing up Keytouch IEC report descriptor [ 2999.435957][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.010D/input/input198 [ 2999.454611][T32409] keytouch 0003:0926:3333.010C: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 2999.523777][T16152] keytouch 0003:0926:3333.010D: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 2999.581285][T16152] usb 6-1: USB disconnect, device number 9 [ 2999.663869][T18219] usb 3-1: USB disconnect, device number 84 04:41:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000c40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:00 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:00 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0x0, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3001.062118][ T8474] EXT4-fs (loop4): inodes count not valid: 201326608 vs 16 04:41:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3001.127795][ T8474] EXT4-fs (loop4): inodes count not valid: 201326608 vs 16 04:41:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000d40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:41:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000e40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3001.241869][ T8515] EXT4-fs (loop4): inodes count not valid: 218103824 vs 16 04:41:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000f40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3001.314238][ T8524] EXT4-fs (loop4): inodes count not valid: 234881040 vs 16 [ 3001.361899][T14619] usb 6-1: new high-speed USB device number 10 using dummy_hcd [ 3001.369568][T32409] usb 3-1: new high-speed USB device number 85 using dummy_hcd [ 3001.395190][ T8532] EXT4-fs (loop4): inodes count not valid: 251658256 vs 16 [ 3001.771753][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3001.782676][T32409] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3001.794093][T14619] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3001.803942][T32409] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3001.814614][T14619] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3001.825005][T32409] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3001.834213][T14619] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3001.842341][T32409] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3001.851541][T14619] usb 6-1: config 0 descriptor?? [ 3001.858150][T32409] usb 3-1: config 0 descriptor?? [ 3002.112561][ T8480] udc-core: couldn't find an available UDC or it's busy [ 3002.119575][ T8480] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3002.121904][ T8481] udc-core: couldn't find an available UDC or it's busy [ 3002.134138][ T8481] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3002.361904][T14619] keytouch 0003:0926:3333.010E: fixing up Keytouch IEC report descriptor [ 3002.370944][T32409] keytouch 0003:0926:3333.010F: fixing up Keytouch IEC report descriptor [ 3002.387775][T14619] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.010E/input/input199 [ 3002.399657][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.010F/input/input200 [ 3002.494144][T14619] keytouch 0003:0926:3333.010E: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 3002.564095][T18219] usb 6-1: USB disconnect, device number 10 [ 3002.570263][T32409] keytouch 0003:0926:3333.010F: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 3002.621530][T32409] usb 3-1: USB disconnect, device number 85 04:41:02 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:02 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) syz_open_dev$evdev(&(0x7f0000000540)='/dev/input/event#\x00', 0xd572, 0x400800) 04:41:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}, @union]}, {0x0, [0x71]}}, 0x0, 0x6f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3003.371277][T32409] usb 6-1: new high-speed USB device number 11 using dummy_hcd [ 3003.431244][T18219] usb 3-1: new high-speed USB device number 86 using dummy_hcd [ 3003.761241][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3003.773495][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3003.784843][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3003.791481][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3003.793912][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3003.813463][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3003.821587][T32409] usb 6-1: config 0 descriptor?? [ 3003.823469][T18219] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3003.838032][T18219] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3003.848927][T18219] usb 3-1: config 0 descriptor?? 04:41:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000041040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3004.064614][ T8619] udc-core: couldn't find an available UDC or it's busy [ 3004.071612][ T8619] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3004.093231][ T8628] udc-core: couldn't find an available UDC or it's busy [ 3004.100256][ T8628] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 04:41:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000201040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3004.144647][ T8646] EXT4-fs (loop4): inodes count not valid: 268697616 vs 16 04:41:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000001140000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3004.249519][ T8656] EXT4-fs (loop4): inodes count not valid: 270532624 vs 16 [ 3004.311472][T32409] keytouch 0003:0926:3333.0110: fixing up Keytouch IEC report descriptor [ 3004.338868][T18219] keytouch 0003:0926:3333.0111: fixing up Keytouch IEC report descriptor [ 3004.340501][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0110/input/input201 04:41:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 3004.359539][ T8660] EXT4-fs (loop4): inodes count not valid: 285212688 vs 16 [ 3004.368793][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0111/input/input202 04:41:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000001240000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3004.425153][ T8660] EXT4-fs (loop4): inodes count not valid: 285212688 vs 16 [ 3004.461410][T18219] keytouch 0003:0926:3333.0111: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 3004.534178][T32409] keytouch 0003:0926:3333.0110: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 3004.548244][T18219] usb 3-1: USB disconnect, device number 86 [ 3004.559150][ T8693] EXT4-fs (loop4): inodes count not valid: 301989904 vs 16 [ 3004.582351][T32409] usb 6-1: USB disconnect, device number 11 04:41:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000001440000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3004.733576][ T8752] EXT4-fs (loop4): inodes count not valid: 335544336 vs 16 [ 3004.806519][ T8752] EXT4-fs (loop4): inodes count not valid: 335544336 vs 16 04:41:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000002040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3004.923578][ T8761] EXT4-fs (loop4): inodes count not valid: 536870928 vs 16 04:41:04 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:04 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000102040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3005.098610][ T8773] EXT4-fs (loop4): inodes count not valid: 537919504 vs 16 [ 3005.350804][T32409] usb 6-1: new high-speed USB device number 12 using dummy_hcd [ 3005.370781][T22548] usb 3-1: new high-speed USB device number 87 using dummy_hcd [ 3005.760692][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3005.771742][T32409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3005.785336][T32409] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3005.795119][T32409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3005.805287][T32409] usb 6-1: config 0 descriptor?? [ 3005.812414][T22548] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3005.824036][T22548] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3005.837323][T22548] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3005.850804][T22548] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3005.859703][T22548] usb 3-1: config 0 descriptor?? [ 3006.048991][ T8768] udc-core: couldn't find an available UDC or it's busy [ 3006.056172][ T8768] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3006.122444][ T8775] udc-core: couldn't find an available UDC or it's busy [ 3006.129463][ T8775] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3006.300935][T32409] keytouch 0003:0926:3333.0112: fixing up Keytouch IEC report descriptor [ 3006.312040][T32409] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0112/input/input203 [ 3006.371054][T22548] keytouch 0003:0926:3333.0113: fixing up Keytouch IEC report descriptor [ 3006.386846][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0113/input/input204 [ 3006.402366][T32409] keytouch 0003:0926:3333.0112: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 3006.493299][T22548] keytouch 0003:0926:3333.0113: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 3006.503302][T16152] usb 6-1: USB disconnect, device number 12 [ 3006.597702][T32409] usb 3-1: USB disconnect, device number 87 04:41:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000002540000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:06 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:06 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3007.202473][ T8865] EXT4-fs (loop4): inodes count not valid: 620757008 vs 16 [ 3007.278005][ T8865] EXT4-fs (loop4): inodes count not valid: 620757008 vs 16 04:41:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000002e40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000003f40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3007.432986][ T8886] EXT4-fs (loop4): inodes count not valid: 771751952 vs 16 [ 3007.462628][ T1189] usb 6-1: new high-speed USB device number 13 using dummy_hcd [ 3007.470376][T16152] usb 3-1: new high-speed USB device number 88 using dummy_hcd [ 3007.512453][ T8895] EXT4-fs (loop4): inodes count not valid: 1056964624 vs 16 [ 3007.556008][ T8895] EXT4-fs (loop4): inodes count not valid: 1056964624 vs 16 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000004040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000004640000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3007.665148][ T8905] EXT4-fs (loop4): inodes count not valid: 1073741840 vs 16 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000004840000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3007.754358][ T8910] EXT4-fs (loop4): inodes count not valid: 1174405136 vs 16 [ 3007.827747][ T8916] EXT4-fs (loop4): inodes count not valid: 1207959568 vs 16 [ 3007.835509][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3007.846590][ T1189] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3007.870440][ T1189] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3007.880601][T16152] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3007.890491][T16152] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3007.899526][ T1189] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3007.905067][ T8916] EXT4-fs (loop4): inodes count not valid: 1207959568 vs 16 [ 3007.908915][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3007.924731][ T1189] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3007.933612][ T1189] usb 6-1: config 0 descriptor?? [ 3007.941036][T16152] usb 3-1: config 0 descriptor?? 04:41:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000004c40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3008.040543][ T8930] EXT4-fs (loop4): inodes count not valid: 1275068432 vs 16 [ 3008.170945][ T8866] udc-core: couldn't find an available UDC or it's busy [ 3008.178102][ T8866] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3008.214716][ T8863] udc-core: couldn't find an available UDC or it's busy [ 3008.221986][ T8863] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3008.410833][ T1189] keytouch 0003:0926:3333.0114: fixing up Keytouch IEC report descriptor [ 3008.429611][ T1189] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0114/input/input205 [ 3008.460557][T16152] keytouch 0003:0926:3333.0115: fixing up Keytouch IEC report descriptor [ 3008.469943][T16152] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0115/input/input206 [ 3008.511247][ T1189] keytouch 0003:0926:3333.0114: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 3008.591235][T16152] keytouch 0003:0926:3333.0115: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 3008.614247][T32409] usb 6-1: USB disconnect, device number 13 [ 3008.692649][ T1189] usb 3-1: USB disconnect, device number 88 04:41:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000005c40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:09 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000dc000000dc00000003000000000000000000000000000004000006040000000000000000000000000000000000000000000000000000000000000000000000000000000000000b00000000000000000b000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008e22e5d200"/234], 0x0, 0xf7}, 0x20) r1 = gettid() write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000400)={0x9, 0xfffffffffffffda5, 0xfa00, {0xffffffffffffffff, 0x51, "42bec6", "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"}}, 0x110) wait4(r1, &(0x7f0000000040), 0x1000000, &(0x7f0000000140)) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) r5 = getpgid(0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0xbaef, 0x4e89}}]}]}]}, 0x3c}}, 0x0) setpriority(0x1, r5, 0x1) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3010.241994][ T9013] A link change request failed with some changes committed already. Interface batadv_slave_1 may have been left with an inconsistent configuration, please check. [ 3010.245903][ T9016] EXT4-fs (loop4): inodes count not valid: 1543503888 vs 16 [ 3010.329750][ T9016] EXT4-fs (loop4): inodes count not valid: 1543503888 vs 16 04:41:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:41:10 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000800404355810740000000000109022400010000000009049e5796b8a4e800000103010000092100000001220100090581030000000000"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000003c0)={0x24, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x22, 0x1, {[@main]}}, 0x0}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') lseek(r1, 0x9d12, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @multicast1}, 0x8) 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000006040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3010.485849][ T9038] EXT4-fs (loop4): inodes count not valid: 1610612752 vs 16 [ 3010.519502][T22548] usb 6-1: new high-speed USB device number 14 using dummy_hcd [ 3010.545664][ T9038] EXT4-fs (loop4): inodes count not valid: 1610612752 vs 16 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000006840000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000016a40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3010.630049][ T9050] EXT4-fs (loop4): inodes count not valid: 1744830480 vs 16 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000006c40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3010.703704][ T9054] EXT4-fs (loop4): inodes count not valid: 1778450448 vs 16 [ 3010.739486][T16152] usb 3-1: new high-speed USB device number 89 using dummy_hcd [ 3010.792312][ T9062] EXT4-fs (loop4): inodes count not valid: 1811939344 vs 16 04:41:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000016e40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3010.834631][ T9062] EXT4-fs (loop4): inodes count not valid: 1811939344 vs 16 [ 3010.914408][ T9071] EXT4-fs (loop4): inodes count not valid: 1845559312 vs 16 [ 3010.940768][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3010.951993][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3010.961808][T22548] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3010.970877][T22548] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3010.981547][T22548] usb 6-1: config 0 descriptor?? [ 3010.988802][ T9071] EXT4-fs (loop4): inodes count not valid: 1845559312 vs 16 [ 3011.109540][T16152] usb 3-1: config 0 has an invalid interface number: 158 but max is 0 [ 3011.117836][T16152] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3011.128427][T16152] usb 3-1: config 0 has no interface number 0 [ 3011.136335][T16152] usb 3-1: too many endpoints for config 0 interface 158 altsetting 87: 150, using maximum allowed: 30 [ 3011.149854][T16152] usb 3-1: config 0 interface 158 altsetting 87 has 0 endpoint descriptors, different from the interface descriptor's value: 150 [ 3011.164027][T16152] usb 3-1: config 0 interface 158 has no altsetting 0 [ 3011.171226][T16152] usb 3-1: New USB device found, idVendor=5543, idProduct=0781, bcdDevice= 0.40 [ 3011.189717][T16152] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3011.216579][T16152] usb 3-1: config 0 descriptor?? [ 3011.230311][ T9014] udc-core: couldn't find an available UDC or it's busy [ 3011.237265][ T9014] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3011.489721][T22548] keytouch 0003:0926:3333.0116: fixing up Keytouch IEC report descriptor [ 3011.502784][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0116/input/input207 [ 3011.583389][T22548] keytouch 0003:0926:3333.0116: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 3011.691959][T18219] usb 6-1: USB disconnect, device number 14 04:41:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000016f40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:13 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3013.286384][ T9132] EXT4-fs (loop4): inodes count not valid: 1862336528 vs 16 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000007440000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3013.336784][ T9132] EXT4-fs (loop4): inodes count not valid: 1862336528 vs 16 04:41:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:41:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000007a40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3013.481496][ T1189] usb 3-1: USB disconnect, device number 89 [ 3013.537572][T18219] usb 6-1: new high-speed USB device number 15 using dummy_hcd [ 3013.547625][ T9160] EXT4-fs (loop4): inodes count not valid: 2046820368 vs 16 [ 3013.615242][ T9160] EXT4-fs (loop4): inodes count not valid: 2046820368 vs 16 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000029040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000029140000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3013.707547][ T9172] EXT4-fs (loop4): inodes count not valid: 2416050192 vs 16 [ 3013.743116][ T9172] EXT4-fs (loop4): inodes count not valid: 2416050192 vs 16 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000029540000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3013.823847][ T9179] EXT4-fs (loop4): inodes count not valid: 2432827408 vs 16 [ 3013.898767][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3013.898785][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3013.935536][ T9186] EXT4-fs (loop4): inodes count not valid: 2499936272 vs 16 [ 3013.951960][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3013.962775][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3013.974509][T18219] usb 6-1: config 0 descriptor?? [ 3013.996183][ T9186] EXT4-fs (loop4): inodes count not valid: 2499936272 vs 16 04:41:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100000fc40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3014.086352][ T9198] EXT4-fs (loop4): inodes count not valid: 4227858448 vs 16 [ 3014.136946][ T9198] EXT4-fs (loop4): inodes count not valid: 4227858448 vs 16 [ 3014.229755][ T9128] udc-core: couldn't find an available UDC or it's busy [ 3014.240075][ T9128] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3014.459234][T18219] keytouch 0003:0926:3333.0117: fixing up Keytouch IEC report descriptor [ 3014.481298][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0117/input/input208 [ 3014.560245][T18219] keytouch 0003:0926:3333.0117: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 3014.662777][T18219] usb 6-1: USB disconnect, device number 15 04:41:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000fff40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:16 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xc8, &(0x7f0000000380)={0x5, 0xf, 0xc8, 0x4, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3016.303979][ T9254] EXT4-fs (loop4): inodes count not valid: 4279173136 vs 16 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000000040000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3016.359364][ T9254] EXT4-fs (loop4): inodes count not valid: 4279173136 vs 16 [ 3016.441166][ T9274] EXT4-fs (loop4): bad geometry: block count 1024 exceeds size of device (70 blocks) 04:41:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:41:16 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000400000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3016.513700][ T9274] EXT4-fs (loop4): bad geometry: block count 1024 exceeds size of device (70 blocks) [ 3016.548081][T18219] usb 6-1: new high-speed USB device number 16 using dummy_hcd [ 3016.600887][ T9290] EXT4-fs (loop4): bad geometry: first data block 1 is beyond end of filesystem (0) [ 3016.640231][ T9290] EXT4-fs (loop4): bad geometry: first data block 1 is beyond end of filesystem (0) 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000009000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3016.747564][ T9301] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3016.757850][ T9301] EXT4-fs (loop4): group descriptors corrupted! 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000015000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3016.813249][ T9301] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3016.823478][ T9301] EXT4-fs (loop4): group descriptors corrupted! [ 3016.858057][T22548] usb 3-1: new high-speed USB device number 90 using dummy_hcd [ 3016.907994][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3016.920635][T18219] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3016.949049][T18219] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3016.964247][ T9310] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3016.982788][T18219] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3016.998792][ T9310] EXT4-fs (loop4): group descriptors corrupted! [ 3017.018311][T18219] usb 6-1: config 0 descriptor?? [ 3017.044246][ T9310] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3017.062919][ T9310] EXT4-fs (loop4): group descriptors corrupted! 04:41:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000016000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3017.171526][ T9323] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3017.182101][ T9323] EXT4-fs (loop4): group descriptors corrupted! [ 3017.237101][ T9323] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3017.247602][ T9323] EXT4-fs (loop4): group descriptors corrupted! [ 3017.258829][T22548] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3017.259846][ T9253] udc-core: couldn't find an available UDC or it's busy [ 3017.271698][T22548] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 04:41:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000025000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3017.284510][ T9253] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3017.318859][T22548] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3017.331310][T22548] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3017.346766][T22548] usb 3-1: config 0 descriptor?? [ 3017.370934][ T9333] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3017.382592][ T9333] EXT4-fs (loop4): group descriptors corrupted! [ 3017.519709][T18219] keytouch 0003:0926:3333.0118: fixing up Keytouch IEC report descriptor [ 3017.543045][T18219] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.0118/input/input209 [ 3017.599508][ T9287] udc-core: couldn't find an available UDC or it's busy [ 3017.610064][ T9287] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3017.639227][T18219] keytouch 0003:0926:3333.0118: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 3017.721765][T18219] usb 6-1: USB disconnect, device number 16 [ 3017.858183][T22548] keytouch 0003:0926:3333.0119: fixing up Keytouch IEC report descriptor [ 3017.868520][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0119/input/input210 [ 3017.978966][T22548] keytouch 0003:0926:3333.0119: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 3018.080271][T18219] usb 3-1: USB disconnect, device number 90 04:41:19 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xc8, &(0x7f0000000380)={0x5, 0xf, 0xc8, 0x4, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x71]}}, 0x0, 0x63}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000027000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:19 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 3019.369235][ T9409] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3019.379535][ T9409] EXT4-fs (loop4): group descriptors corrupted! [ 3019.427750][ T9409] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3019.443407][ T9409] EXT4-fs (loop4): group descriptors corrupted! 04:41:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="100000003f000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000240000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3019.553795][ T9435] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 3019.564452][ T9435] EXT4-fs (loop4): group descriptors corrupted! [ 3019.617336][T14617] usb 3-1: new high-speed USB device number 91 using dummy_hcd [ 3019.624967][T22548] usb 6-1: new high-speed USB device number 17 using dummy_hcd [ 3019.649191][ T9440] EXT4-fs (loop4): inodes count not valid: 33554448 vs 16 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000340000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3019.691909][ T9440] EXT4-fs (loop4): inodes count not valid: 33554448 vs 16 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000440000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3019.771364][ T9451] EXT4-fs (loop4): inodes count not valid: 50331664 vs 16 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000540000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3019.850241][ T9456] EXT4-fs (loop4): inodes count not valid: 67108880 vs 16 [ 3019.939214][ T9463] EXT4-fs (loop4): inodes count not valid: 83886096 vs 16 04:41:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000640000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3020.018754][T14617] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3020.029878][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3020.046666][T22548] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3020.059961][T14617] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3020.071876][T14617] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3020.079889][ T9470] EXT4-fs (loop4): inodes count not valid: 100663312 vs 16 [ 3020.081052][T22548] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3020.110335][T22548] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3020.127284][T14617] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3020.148605][T22548] usb 6-1: config 0 descriptor?? [ 3020.153989][T14617] usb 3-1: config 0 descriptor?? [ 3020.407995][ T9414] udc-core: couldn't find an available UDC or it's busy [ 3020.411613][ T9410] udc-core: couldn't find an available UDC or it's busy [ 3020.415010][ T9414] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3020.423439][ T9410] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3020.677544][T14617] keytouch 0003:0926:3333.011A: fixing up Keytouch IEC report descriptor [ 3020.686412][T22548] keytouch 0003:0926:3333.011B: fixing up Keytouch IEC report descriptor [ 3020.695820][T22548] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.011B/input/input211 [ 3020.709059][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.011A/input/input212 [ 3020.798400][T22548] keytouch 0003:0926:3333.011B: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 [ 3020.869445][T14617] keytouch 0003:0926:3333.011A: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 3020.920715][T14617] usb 3-1: USB disconnect, device number 91 [ 3020.967921][T22548] usb 6-1: USB disconnect, device number 17 04:41:21 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xc8, &(0x7f0000000380)={0x5, 0xf, 0xc8, 0x4, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) [ 3021.686843][T14617] usb 6-1: new high-speed USB device number 18 using dummy_hcd [ 3022.046933][T14617] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3022.057948][T14617] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3022.074862][T14617] usb 6-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 3022.087751][T14617] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3022.104359][T14617] usb 6-1: config 0 descriptor?? 04:41:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x71]}}, 0x0, 0x63}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000740000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:22 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x5543, 0x781, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000003c0)={0x24, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x22, 0x1, {[@main]}}, 0x0}, 0x0) 04:41:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x71]}}, 0x0, 0x63}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 3022.347592][ T9549] udc-core: couldn't find an available UDC or it's busy [ 3022.354650][ T9549] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 3022.401360][ T9564] EXT4-fs (loop4): inodes count not valid: 117440528 vs 16 [ 3022.476682][ T9564] EXT4-fs (loop4): inodes count not valid: 117440528 vs 16 04:41:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0x0, 0x2}]}, @restrict, @union={0x0, 0xb, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0xf7}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:41:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}, @enum={0x3, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {0xd}]}, @var={0x5, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x71]}}, 0x0, 0x63}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000840000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000940000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3022.588447][T14617] keytouch 0003:0926:3333.011C: fixing up Keytouch IEC report descriptor [ 3022.601548][T14617] input: HID 0926:3333 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.0/0003:0926:3333.011C/input/input213 [ 3022.625695][ T9589] EXT4-fs (loop4): inodes count not valid: 134217744 vs 16 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000a40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3022.666617][T18219] usb 3-1: new high-speed USB device number 92 using dummy_hcd [ 3022.707752][T14617] keytouch 0003:0926:3333.011C: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.5-1/input0 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000b40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3022.750661][ T9611] EXT4-fs (loop4): inodes count not valid: 167772176 vs 16 [ 3022.788793][ T1188] usb 6-1: USB disconnect, device number 18 [ 3022.840247][ T9635] EXT4-fs (loop4): inodes count not valid: 184549392 vs 16 04:41:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000c40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3022.907189][ T9635] EXT4-fs (loop4): inodes count not valid: 184549392 vs 16 [ 3022.976294][ T9646] EXT4-fs (loop4): inodes count not valid: 201326608 vs 16 [ 3023.023744][ T9646] EXT4-fs (loop4): inodes count not valid: 201326608 vs 16 [ 3023.096660][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3023.107650][T18219] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3023.125808][T18219] usb 3-1: New USB device found, idVendor=5543, idProduct=0781, bcdDevice= 0.40 [ 3023.139561][T18219] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3023.160771][T18219] usb 3-1: config 0 descriptor?? 04:41:23 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x172f, 0x500, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xe6, 0xc0, 0x1, [{{0x9, 0x4, 0x0, 0x8, 0x2, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x7ff, 0x80, 0x1, {0x22, 0xd47}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x6, 0x8, 0x67}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x7, 0x1f, 0x5, 0xff, 0x8}, 0xec, &(0x7f0000000380)={0x5, 0xf, 0xec, 0x5, [@generic={0x48, 0x10, 0x3, "8309cbc60fbdab83de6a30db02242792fc93e812601c9b8f138538f118871a602d3aca8c09d55615c2f97686a5ebe449d68a8a1b89257e9e45e63661b7bd481b7665376593"}, @generic={0x67, 0x10, 0x3, "32275f1ecac5bf23f603b702ad7b1a8fe6b307634f182d74fb05d93e4790eda518d8188846d89621cf41c2617a9364504678e03def45de2ac0da6855c4192d287045e96a1dd3bb002c781193d7b78b6fcf4e1f81d6e911eab230e25a1bae3f57ef857186"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x8, 0x0, 0xac9c}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xf, 0x1d, 0xf7, 0x6}, @ssp_cap={0x24, 0x10, 0xa, 0x0, 0x6, 0x3f, 0xff11, 0xffff, [0x0, 0xc000, 0xc000, 0x0, 0xc00f, 0xcf]}]}, 0x4, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x41a}}, {0x10, &(0x7f0000000140)=@string={0x10, 0x3, "3757c1e29cef26b5aa4085ecf4d6"}}, {0x65, &(0x7f0000000180)=@string={0x65, 0x3, "8e828ea64056973d81a9059897bfba6d45ed948e2fd2f04172a2513f1b67c0a450d0e02d585fea40393422f2fed890fe416c780a972c7f5f781269118b61c43da3adb55bb09cea12f80f498040334985b0b996636a304f6b9bc143bb010b051b496e64"}}, {0x4, &(0x7f0000000480)=@lang_id={0x4, 0x3, 0x447}}]}) syz_usb_control_io(r0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)={0x5, 0x0, 0x9, 0x42, "acafa61c514dec0ea111fb92adef7da566b059bc0438ba01000020026a2268f0"}) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) write$hidraw(r1, &(0x7f0000000240)="93198873c2333b7b0953856c0019f06c4e047d687668169e2a8b25b91fec367f92d77c87a3af9dc9aa2d8dbffc2ed218ff613e64c354529ee1b29ae6bfbbabdfe21a7aa27c076c0edfb3b845329a0290c65db088510308cb5b96d9116b7bcf3e6a64fed1fc9b8895a718b444ba51cd645d0406d3aa0e2b8f32e76e2b0e040eaa897c402a2ace4e4f6184b682362e7d57efab7335fb3e0e5725be784dacbf862d3c3779542958791ec345353fa4217acea7ab6be3c6ec2da17c15a7e4929e888d9a29b9942af3", 0xc6) 04:41:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000d40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3023.348394][ T9660] EXT4-fs (loop4): inodes count not valid: 218103824 vs 16 [ 3023.413730][ T9660] EXT4-fs (loop4): inodes count not valid: 218103824 vs 16 04:41:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000e40000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000000b80)) [ 3023.494782][ T9673] EXT4-fs (loop4): inodes count not valid: 234881040 vs 16 [ 3023.528895][ T9673] EXT4-fs (loop4): inodes count not valid: 234881040 vs 16 [ 3023.616434][ T1188] usb 6-1: new high-speed USB device number 19 using dummy_hcd [ 3023.647277][T18219] uclogic 0003:5543:0781.011D: unknown main item tag 0x0 [ 3023.658804][T18219] uclogic 0003:5543:0781.011D: hidraw0: USB HID v0.00 Device [HID 5543:0781] on usb-dummy_hcd.2-1/input0 [ 3023.799693][ T4896] ==================================================================